Security
Headlines
HeadlinesLatestCVEs

Tag

#java

DriverPack Solution CMS 17.11.108 Cross Site Scripting

DriverPack Solution CMS version 17.11.108 suffers from a cross site scripting vulnerability.

Packet Storm
#sql#xss#csrf#vulnerability#web#ios#mac#windows#apple#google#ubuntu#linux#debian#cisco#java#php#perl#auth#ruby#firefox
Deprixa 3.2.5 Cross Site Request Forgery

Deprixa version 3.2.5 suffers from a cross site request forgery vulnerability.

CVE-2023-38347: XSS in Benno MailArchiv Web-App (benno-rest-lib – Sebastian's Blog

An issue was discovered in LWsystems Benno MailArchiv 2.10.1. Attackers can cause XSS via JavaScript content to a mailbox.

CVE-2023-39008: LogicalTrust - [EN] A-Z: OPNsense - Penetration Test

A command injection vulnerability in the component /api/cron/settings/setJob/ of OPNsense before 23.7 allows attackers to execute arbitrary system commands.

CVE-2023-39000: System:Logging - Sanitize user input. An alfanum filter might be poss… · opnsense/core@d1f350c

A reflected cross-site scripting (XSS) vulnerability in the component /ui/diagnostics/log/core/ of OPNsense before 23.7 allows attackers to inject arbitrary JavaScript via the URL path.

Metabase Remote Code Execution

Metabase versions before 0.46.6.1 contain a flaw where the secret setup-token is accessible even after the setup process has been completed. With this token a user is able to submit the setup functionality to create a new database. When creating a new database, an H2 database string is created with a TRIGGER that allows for code execution. We use a sample database for our connection string to prevent corrupting real databases. Successfully tested against Metabase 0.46.6.

Lucee 5.4.2.17 Cross Site Scripting

Lucee version 5.4.2.17 suffers from a cross site scripting vulnerability.

GHSA-9c4h-3f7h-322r: SES's dynamic import and spread operator provides possible path to arbitrary exfiltration and execution

### Impact This is a hole in the confinement of guest applications under SES that may manifest as either the ability to exfiltrate information or execute arbitrary code depending on the configuration and implementation of the surrounding host. Guest program running inside a Compartment with as few as no endowments can gain access to the surrounding host’s dynamic import by using dynamic import after the spread operator, like `{...import(arbitraryModuleSpecifier)}`. On the web or in web extensions, a Content-Security-Policy following ordinary best practices likely mitigates both the risk of exfiltration and execution of arbitrary code, at least limiting the modules that the attacker can import to those that are already part of the application. However, without a Content-Security-Policy, dynamic import can be used to issue HTTP requests for either communication through the URL or for the execution of code reachable from that origin. Within an XS worker, an attacker can use the host’s...