Security
Headlines
HeadlinesLatestCVEs

Tag

#git

GHSA-8qpw-xqxj-h4r2: aiohttp's HTTP parser (the python one, not llhttp) still overly lenient about separators

### Summary Security-sensitive parts of the *Python HTTP parser* retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. ### Details These problems are rooted in pattern matching protocol elements, previously improved by PR #3235 and GHSA-gfw2-4jvh-wgfg: 1. The expression `HTTP/(\d).(\d)` lacked another backslash to clarify that the separator should be a literal dot, not just *any* Unicode code point (result: `HTTP/(\d)\.(\d)`). 2. The HTTP version was permitting Unicode digits, where only ASCII digits are standards-compliant. 3. Distinct regular expressions for validating HTTP Method and Header field names were used - though both should (at least) apply the common restrictions of rfc9110 `token`. ### PoC `GET / HTTP/...

ghsa
#git
GHSA-wpxw-5xfm-x22v: MeshCentral algorithm-downgrade issue

An algorithm-downgrade issue was discovered in Ylianst MeshCentral 1.1.16.

Threat Actors Selling 1.8TB Database of Indian Mobile Users

By Deeba Ahmed Two groups of threat actors, namely CYBO CREW and UNIT8200, are apparently selling the same database with a price tag of $3,000. This is a post from HackRead.com Read the original post: Threat Actors Selling 1.8TB Database of Indian Mobile Users

Control D Launches Control D for Organizations: Democratizing Cybersecurity

By cyberwire Toronto, Canada, January 29th, 2024, Cyberwire – In an era where online threats no longer discriminate by business… This is a post from HackRead.com Read the original post: Control D Launches Control D for Organizations: Democratizing Cybersecurity

NSA Admits Buying American Browsing Records From Shady Markets

By Deeba Ahmed From Snowden to Shady Markets: The Long History of NSA's Unchecked Surveillance. This is a post from HackRead.com Read the original post: NSA Admits Buying American Browsing Records From Shady Markets

Debian Security Advisory 5608-1

Debian Linux Security Advisory 5608-1 - A heap-based buffer overflow during tile list parsing was discovered in the AV1 video codec parser for the GStreamer media framework, which may result in denial of service or potentially the execution of arbitrary code if a malformed media file is opened.

CSZCMS 1.3.0 SQL Injection

CSZCMS version 1.3.0 suffers from a remote SQL injection vulnerability in the admin flows.

In conversation: Bruce Schneier on AI-powered mass spying

Senior Privacy Advocate David Ruiz speaks with Bruce Schneier about artificial intelligence, surveillance, and an era of "mass spying."

Chrome 121 Javascript Fork Malloc Bomb

Chrome version 121 suffers from a javascript fork malloc vulnerability that indicates memory corruption upon crash.