-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmessages29.html
19014 lines (11882 loc) · 790 KB
/
messages29.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8"/>
<title>Exported Data</title>
<meta content="width=device-width, initial-scale=1.0" name="viewport"/>
<link href="css/style.css" rel="stylesheet"/>
<script src="js/script.js" type="text/javascript">
</script>
</head>
<body onload="CheckLocation();">
<div class="page_wrap">
<div class="page_header">
<div class="content">
<div class="text bold">
🛡 Cybersecurity & Privacy news 🛡
</div>
</div>
</div>
<div class="page_body chat_page">
<div class="history">
<a class="pagination block_link" href="messages28.html">
Previous messages
</a>
<div class="message service" id="message-884">
<div class="body details">
31 August 2021
</div>
</div>
<div class="message default clearfix" id="message28098">
<div class="pull_left userpic_wrap">
<div class="userpic userpic4" style="width: 42px; height: 42px">
<div class="initials" style="line-height: 42px">
?
</div>
</div>
</div>
<div class="body">
<div class="pull_right date details" title="31.08.2021 13:36:38">
13:36
</div>
<div class="from_name">
🛡 Cybersecurity & Privacy news 🛡
</div>
<div class="text">
<strong>🛠 GNU Privacy Guard 2.2.30 🛠</strong><br><br><code>GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.</code><br><br><a href="https://packetstormsecurity.com/files/164000/gnupg-2.2.30.tar.bz2">📖 Read</a><br><br>via "<em>Packet Storm Security</em>".
</div>
</div>
</div>
<div class="message default clearfix" id="message28099">
<div class="pull_left userpic_wrap">
<div class="userpic userpic4" style="width: 42px; height: 42px">
<div class="initials" style="line-height: 42px">
?
</div>
</div>
</div>
<div class="body">
<div class="pull_right date details" title="31.08.2021 14:11:36">
14:11
</div>
<div class="from_name">
🛡 Cybersecurity & Privacy news 🛡
</div>
<div class="text">
<strong>🦿 Data privacy, governance and insights are all important obligations for businesses 🦿</strong><br><br><code>Expert: Information management can also lead to a massive value proposition in being able to tap into governed data for business insights.</code><br><br><a href="https://www.techrepublic.com/article/data-privacy-governance-and-insights-are-all-important-obligations-for-businesses/#ftag=RSS56d97e7">📖 Read</a><br><br>via "<em>Tech Republic</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28100">
<div class="body">
<div class="pull_right date details" title="31.08.2021 14:11:38">
14:11
</div>
<div class="text">
<strong>🦿 Data compliance: "The world is still waking up to the challenges ahead," expert says 🦿</strong><br><br><code>Bringing together siloed data from all parts of the business is a huge challenge to IT departments when meeting compliance requirements.</code><br><br><a href="https://www.techrepublic.com/videos/data-compliance-the-world-is-still-waking-up-to-the-challenges-ahead-expert-says/#ftag=RSS56d97e7">📖 Read</a><br><br>via "<em>Tech Republic</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28101">
<div class="body">
<div class="pull_right date details" title="31.08.2021 14:14:35">
14:14
</div>
<div class="text">
<strong>⚠ Big bad decryption bug in OpenSSL – but no cause for alarm ⚠</strong><br><br><code>The buggy code's in there, alright. Fortunately, it's hard to get OpenSSL to use it even if you want to, which mitigates the risk.</code><br><br><a href="https://nakedsecurity.sophos.com/2021/08/27/big-bad-decryption-bug-in-openssl-but-no-cause-for-alarm/">📖 Read</a><br><br>via "<em>Naked Security</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28102">
<div class="body">
<div class="pull_right date details" title="31.08.2021 14:14:36">
14:14
</div>
<div class="text">
<strong>⚠ Skimming the CREAM – recursive withdrawals loot $13M in cryptocash ⚠</strong><br><br><code>Recursion [noun]: see recursion.</code><br><br><a href="https://nakedsecurity.sophos.com/2021/08/31/skimming-the-cream-recursive-withdrawals-loot-13m-in-cryptocash/">📖 Read</a><br><br>via "<em>Naked Security</em>".
</div>
</div>
</div>
<div class="message default clearfix" id="message28103">
<div class="pull_left userpic_wrap">
<div class="userpic userpic4" style="width: 42px; height: 42px">
<div class="initials" style="line-height: 42px">
?
</div>
</div>
</div>
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:35">
15:33
</div>
<div class="from_name">
🛡 Cybersecurity & Privacy news 🛡
</div>
<div class="text">
<strong>‼ CVE-2021-22943 ‼</strong><br><br><code>A vulnerability found in UniFi Protect application V1.18.1 and earlier permits a malicious actor who has already gained access to a network to subsequently control the Protect camera(s) assigned to said network. This vulnerability is fixed in UniFi Protect application V1.19.0 and later.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22943">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28104">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:36">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-39163 ‼</strong><br><br><code>Matrix is an ecosystem for open federated Instant Messaging and Voice over IP. In versions 1.41.0 and prior, unauthorised users can access the name, avatar, topic and number of members of a room if they know the ID of the room. This vulnerability is limited to homeservers where the vulnerable homeserver is in the room and untrusted users are permitted to create groups (communities). By default, only homeserver administrators can create groups. However, homeserver administrators can already access this information in the database or using the admin API. As a result, only homeservers where the configuration setting `enable_group_creation` has been set to `true` are impacted. Server administrators should upgrade to 1.41.1 or higher to patch the vulnerability. There are two potential workarounds. Server administrators can set `enable_group_creation` to `false` in their homeserver configuration (this is the default value) to prevent creation of groups by non-administrators. Administrators that are using a reverse proxy could, with partial loss of group functionality, block the endpoints `/_matrix/client/r0/groups/{group_id}/rooms` and `/_matrix/client/unstable/groups/{group_id}/rooms`.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39163">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28105">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:37">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-35223 ‼</strong><br><br><code>The Serv-U File Server allows for events such as user login failures to be audited by executing a command. This command can be supplied with parameters that can take the form of ‘user string variables,â€� allowing remote code execution.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35223">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28106">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:38">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-22944 ‼</strong><br><br><code>A vulnerability found in UniFi Protect application V1.18.1 and earlier allows a malicious actor with a view-only role and network access to gain the same privileges as the owner of the UniFi Protect application. This vulnerability is fixed in UniFi Protect application V1.19.0 and later.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22944">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28107">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:40">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-39134 ‼</strong><br><br><code>`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39134">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28108">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:42">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-37701 ‼</strong><br><br><code>The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37701">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28109">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:43">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-35239 ‼</strong><br><br><code>A security researcher found a user with Orion map manage rights could store XSS through via text box hyperlink.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35239">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28110">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:45">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-22684 ‼</strong><br><br><code>Tizen RT RTOS version 3.0.GBB is vulnerable to integer wrap-around in functions_calloc and mm_zalloc. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22684">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28111">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:46">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-29907 ‼</strong><br><br><code>IBM OpenPages with Watson 8.1 and 8.2 could allow an authenticated user to upload a file that could execute arbitrary code on the system. IBM X-Force ID: 207633.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-29907">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28112">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:48">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-39135 ‼</strong><br><br><code>`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39135">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28113">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:50">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-3634 ‼</strong><br><br><code>A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3634">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28114">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:52">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-37712 ‼</strong><br><br><code>The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37712">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28115">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:53">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-35213 ‼</strong><br><br><code>An Improper Access Control Privilege Escalation Vulnerability was discovered in the User Setting of Orion Platform version 2020.2.5. It allows a guest user to elevate privileges to the Administrator using this vulnerability. Authentication is required to exploit the vulnerability.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35213">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28116">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:55">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-21811 ‼</strong><br><br><code>A memory corruption vulnerability exists in the XML-parsing CreateLabelOrAttrib functionality of AT&T Labs’ Xmill 0.7. A specially crafted XML file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21811">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28117">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:56">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-37713 ‼</strong><br><br><code>The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\path`. If the drive letter does not match the extraction target, for example `D:\extraction\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37713">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28118">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:58">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-35212 ‼</strong><br><br><code>An SQL injection Privilege Escalation Vulnerability was discovered in the Orion Platform reported by the ZDI Team. A blind Boolean SQL injection which could lead to full read/write over the Orion database content including the Orion certificate for any authenticated user.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35212">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28119">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:33:59">
15:33
</div>
<div class="text">
<strong>‼ CVE-2021-39164 ‼</strong><br><br><code>Matrix is an ecosystem for open federated Instant Messaging and Voice over IP. In versions 1.41.0 and prior, unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room. The vulnerability is limited to rooms with `shared` history visibility. Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the room. Server administrators should upgrade to 1.41.1 or later in order to receive the patch. One workaround is available. Administrators of servers that use a reverse proxy could, with potentially unacceptable loss of functionality, block the endpoints: `/_matrix/client/r0/rooms/{room_id}/members` with `at` query parameter, and `/_matrix/client/unstable/rooms/{room_id}/members` with `at` query parameter.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39164">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28120">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:34:00">
15:34
</div>
<div class="text">
<strong>‼ CVE-2021-22929 ‼</strong><br><br><code>An information disclosure exists in Brave Browser Desktop prior to version 1.28.62, where logged warning messages that included timestamps of connections to V2 onion domains in tor.log.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22929">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28121">
<div class="body">
<div class="pull_right date details" title="31.08.2021 15:34:01">
15:34
</div>
<div class="text">
<strong>‼ CVE-2021-35240 ‼</strong><br><br><code>A security researcher stored XSS via a Help Server setting. This affects customers using Internet Explorer, because they do not support 'rel=noopener'.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35240">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix" id="message28122">
<div class="pull_left userpic_wrap">
<div class="userpic userpic4" style="width: 42px; height: 42px">
<div class="initials" style="line-height: 42px">
?
</div>
</div>
</div>
<div class="body">
<div class="pull_right date details" title="31.08.2021 16:11:37">
16:11
</div>
<div class="from_name">
🛡 Cybersecurity & Privacy news 🛡
</div>
<div class="text">
<strong>🦿 Top 5 autonomous car roadblocks 🦿</strong><br><br><code>Tom Merritt tells us the things that are getting in the way of autonomous car adoption.</code><br><br><a href="https://www.techrepublic.com/article/top-5-autonomous-car-roadblocks/#ftag=RSS56d97e7">📖 Read</a><br><br>via "<em>Tech Republic</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28123">
<div class="body">
<div class="pull_right date details" title="31.08.2021 16:11:38">
16:11
</div>
<div class="text">
<strong>🦿 Roadblocks to autonomous cars: Top 5 🦿</strong><br><br><code>Tom Merritt tells us about the things that are getting in the way of autonomous car adoption.</code><br><br><a href="https://www.techrepublic.com/videos/roadblocks-to-autonomous-cars-top-5/#ftag=RSS56d97e7">📖 Read</a><br><br>via "<em>Tech Republic</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28124">
<div class="body">
<div class="pull_right date details" title="31.08.2021 16:11:39">
16:11
</div>
<div class="text">
<strong>🦿 A passwordless future isn't close: It's here 🦿</strong><br><br><code>Authentication sans password is already possible and solutions are on the market from companies like Ping Identity. With passwords passé, it's time to make the leap to better security.</code><br><br><a href="https://www.techrepublic.com/article/a-passwordless-future-isnt-close-its-here/#ftag=RSS56d97e7">📖 Read</a><br><br>via "<em>Tech Republic</em>".
</div>
</div>
</div>
<div class="message default clearfix" id="message28125">
<div class="pull_left userpic_wrap">
<div class="userpic userpic4" style="width: 42px; height: 42px">
<div class="initials" style="line-height: 42px">
?
</div>
</div>
</div>
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:11:40">
17:11
</div>
<div class="from_name">
🛡 Cybersecurity & Privacy news 🛡
</div>
<div class="text">
<strong>🦿 Identity is replacing the password: What software developers and IT pros need to know 🦿</strong><br><br><code>Identity and access management is pushing application security past single-factor authentication (a password) and even multi-factor authentication to a risk management model says Ping Identity CEO.</code><br><br><a href="https://www.techrepublic.com/article/identity-is-replacing-the-password-what-software-developers-and-it-pros-need-to-know/#ftag=RSS56d97e7">📖 Read</a><br><br>via "<em>Tech Republic</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28126">
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:11:42">
17:11
</div>
<div class="text">
<strong>🦿 Ping Identity CEO explains how identity and access management is replacing the password 🦿</strong><br><br><code>Andre Durand, Founder and CEO of Ping Identity, talks about out how identity and access management is changing software development and application security in this Dynamic Developer episode.</code><br><br><a href="https://www.techrepublic.com/videos/ping-identity-ceo-explains-how-identity-and-access-management-is-replacing-the-password/#ftag=RSS56d97e7">📖 Read</a><br><br>via "<em>Tech Republic</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28127">
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:19:37">
17:19
</div>
<div class="text">
<strong>❌ Proxyware Services Open Orgs to Abuse – Report ❌</strong><br><br><code>Services that let consumers resell their bandwidth for money are ripe for abuse, researchers warn.</code><br><br><a href="https://threatpost.com/abuse-of-proxyware-services/169068/">📖 Read</a><br><br>via "<em>Threat Post</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28128">
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:33:39">
17:33
</div>
<div class="text">
<strong>‼ CVE-2021-36234 ‼</strong><br><br><code>Use of a hard-coded cryptographic key in MIK.starlight 7.9.5.24363 allows local users to decrypt credentials via unspecified vectors.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36234">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28129">
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:33:40">
17:33
</div>
<div class="text">
<strong>‼ CVE-2021-27668 ‼</strong><br><br><code>HashiCorp Vault Enterprise 0.9.2 through 1.6.2 allowed the read of license metadata from DR secondaries without authentication. Fixed in 1.6.3.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27668">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28130">
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:33:41">
17:33
</div>
<div class="text">
<strong>‼ CVE-2021-40085 ‼</strong><br><br><code>An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-40085">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28131">
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:33:42">
17:33
</div>
<div class="text">
<strong>‼ CVE-2021-39176 ‼</strong><br><br><code>detect-character-encoding is a package for detecting character encoding using ICU. In detect-character-encoding v0.3.0 and earlier, allocated memory is not released. The problem has been patched in detect-character-encoding v0.3.1.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39176">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28132">
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:33:42">
17:33
</div>
<div class="text">
<strong>‼ CVE-2021-37794 ‼</strong><br><br><code>A stored cross-site scripting (XSS) vulnerability exists in FileBrowser < v2.16.0 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger malicious OS commands on the server running the FileBrowser instance.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37794">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28133">
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:33:44">
17:33
</div>
<div class="text">
<strong>‼ CVE-2021-36231 ‼</strong><br><br><code>Deserialization of untrusted data in multiple functions in MIK.starlight 7.9.5.24363 allows authenticated remote attackers to execute operating system commands by crafting serialized objects.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36231">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28134">
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:33:45">
17:33
</div>
<div class="text">
<strong>‼ CVE-2021-36232 ‼</strong><br><br><code>Improper Authorization in multiple functions in MIK.starlight 7.9.5.24363 allows an authenticated attacker to escalate privileges.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36232">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28135">
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:33:46">
17:33
</div>
<div class="text">
<strong>‼ CVE-2021-36233 ‼</strong><br><br><code>The function AdminGetFirstFileContentByFilePath in MIK.starlight 7.9.5.24363 allows (by design) an authenticated attacker to read arbitrary files from the filesystem by specifying the file path.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36233">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28136">
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:33:47">
17:33
</div>
<div class="text">
<strong>‼ CVE-2021-39180 ‼</strong><br><br><code>OpenOLAT is a web-based learning management system (LMS). A path traversal vulnerability exists in versions prior to 15.3.18, 15.5.3, and 16.0.0. Using a specially prepared ZIP file, it is possible to overwrite any file that is writable by the application server user (e.g. the tomcat user). Depending on the configuration this can be limited to files of the OpenOlat user data directory, however, if not properly set up, the attack could also be used to overwrite application server config files, java code or even operating system files. The attack could be used to corrupt or modify any OpenOlat file such as course structures, config files or temporary test data. Those attack would require in-depth knowledge of the installation and thus more theoretical. If the app server configuration allows the execution of jsp files and the path to the context is known, it is also possible to execute java code. If the app server runs with the same user that is used to deploy the OpenOlat code or has write permissions on the OpenOlat code files and the path to the context is know, code injection is possible. The attack requires an OpenOlat user account to upload a ZIP file and trigger the unzip method. It can not be exploited by unregistered users. The problem is fixed in versions 15.3.18, 15.5.3 and 16.0.0. There are no known workarounds aside from upgrading.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39180">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix" id="message28137">
<div class="pull_left userpic_wrap">
<div class="userpic userpic4" style="width: 42px; height: 42px">
<div class="initials" style="line-height: 42px">
?
</div>
</div>
</div>
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:49:39">
17:49
</div>
<div class="from_name">
🛡 Cybersecurity & Privacy news 🛡
</div>
<div class="text">
<strong>❌ Cream Finance DeFi Platform Rooked For $29M ❌</strong><br><br><code>Cream is latest DeFi platform to get fleeced in rash of attacks.</code><br><br><a href="https://threatpost.com/cream-finance-defi-29m/169077/">📖 Read</a><br><br>via "<em>Threat Post</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28138">
<div class="body">
<div class="pull_right date details" title="31.08.2021 17:49:41">
17:49
</div>
<div class="text">
<strong>❌ Fortress Home Security Open to Remote Disarmament ❌</strong><br><br><code>A pair of unpatched security vulnerabilities can allow unauthenticated cyberattackers to turn off window, door and motion-sensor monitoring.</code><br><br><a href="https://threatpost.com/fortress-home-security-remote-disarmament/169069/">📖 Read</a><br><br>via "<em>Threat Post</em>".
</div>
</div>
</div>
<div class="message default clearfix" id="message28139">
<div class="pull_left userpic_wrap">
<div class="userpic userpic4" style="width: 42px; height: 42px">
<div class="initials" style="line-height: 42px">
?
</div>
</div>
</div>
<div class="body">
<div class="pull_right date details" title="31.08.2021 18:41:40">
18:41
</div>
<div class="from_name">
🛡 Cybersecurity & Privacy news 🛡
</div>
<div class="text">
<strong>🦿 Don't forget to evaluate soft skills when hiring for cybersecurity positions 🦿</strong><br><br><code>Soft skills are just as important, if not more so, than technical skills in cybersecurity professionals. People with soft skills can be trained in tech skills, expert says.</code><br><br><a href="https://www.techrepublic.com/article/dont-forget-to-evaluate-soft-skills-when-hiring-for-cybersecurity-positions/#ftag=RSS56d97e7">📖 Read</a><br><br>via "<em>Tech Republic</em>".
</div>
</div>
</div>
<div class="message default clearfix" id="message28140">
<div class="pull_left userpic_wrap">
<div class="userpic userpic4" style="width: 42px; height: 42px">
<div class="initials" style="line-height: 42px">
?
</div>
</div>
</div>
<div class="body">
<div class="pull_right date details" title="31.08.2021 19:33:45">
19:33
</div>
<div class="from_name">
🛡 Cybersecurity & Privacy news 🛡
</div>
<div class="text">
<strong>‼ CVE-2021-22029 ‼</strong><br><br><code>VMware Workspace ONE UEM REST API contains a denial of service vulnerability. A malicious actor with access to /API/system/admins/session could cause an API denial of service due to improper rate limiting.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22029">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix" id="message28141">
<div class="pull_left userpic_wrap">
<div class="userpic userpic4" style="width: 42px; height: 42px">
<div class="initials" style="line-height: 42px">
?
</div>
</div>
</div>
<div class="body">
<div class="pull_right date details" title="31.08.2021 21:33:55">
21:33
</div>
<div class="from_name">
🛡 Cybersecurity & Privacy news 🛡
</div>
<div class="text">
<strong>‼ CVE-2021-22002 ‼</strong><br><br><code>VMware Workspace ONE Access and Identity Manager, allow the /cfg web app and diagnostic endpoints, on port 8443, to be accessed via port 443 using a custom host header. A malicious actor with network access to port 443 could tamper with host headers to facilitate access to the /cfg web app, in addition a malicious actor could access /cfg diagnostic endpoints without authentication.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22002">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28142">
<div class="body">
<div class="pull_right date details" title="31.08.2021 21:34:01">
21:34
</div>
<div class="text">
<strong>‼ CVE-2021-22003 ‼</strong><br><br><code>VMware Workspace ONE Access and Identity Manager, unintentionally provide a login interface on port 7443. A malicious actor with network access to port 7443 may attempt user enumeration or brute force the login endpoint, which may or may not be practical based on lockout policy configuration and password complexity for the target account.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22003">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28143">
<div class="body">
<div class="pull_right date details" title="31.08.2021 21:34:06">
21:34
</div>
<div class="text">
<strong>‼ CVE-2020-20490 ‼</strong><br><br><code>A heap buffer-overflow in the client_example1.c component of libiec_iccp_mod v1.5 leads to a denial of service (DOS).</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20490">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28144">
<div class="body">
<div class="pull_right date details" title="31.08.2021 21:34:10">
21:34
</div>
<div class="text">
<strong>‼ CVE-2020-20486 ‼</strong><br><br><code>IEC104 v1.0 contains a stack-buffer overflow in the parameter Iec10x_Sta_Addr.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20486">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message service" id="message-885">
<div class="body details">
1 September 2021
</div>
</div>
<div class="message default clearfix" id="message28145">
<div class="pull_left userpic_wrap">
<div class="userpic userpic4" style="width: 42px; height: 42px">
<div class="initials" style="line-height: 42px">
?
</div>
</div>
</div>
<div class="body">
<div class="pull_right date details" title="01.09.2021 07:34:35">
07:34
</div>
<div class="from_name">
🛡 Cybersecurity & Privacy news 🛡
</div>
<div class="text">
<strong>‼ CVE-2021-37415 ‼</strong><br><br><code>Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37415">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>
<div class="message default clearfix joined" id="message28146">
<div class="body">
<div class="pull_right date details" title="01.09.2021 07:34:39">
07:34
</div>
<div class="text">
<strong>‼ CVE-2021-39109 ‼</strong><br><br><code>The renderWidgetResource resource in Atlasian Atlasboard before version 1.1.9 allows remote attackers to read arbitrary files via a path traversal vulnerability.</code><br><br><a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39109">📖 Read</a><br><br>via "<em>National Vulnerability Database</em>".
</div>
</div>
</div>