Security
Headlines
HeadlinesLatestCVEs

Tag

#redis

Red Hat Security Advisory 2022-6527-01

Red Hat Security Advisory 2022-6527-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.11.0 RPMs.

Packet Storm
#vulnerability#red_hat#redis#js#ssh#rpm
RHSA-2022:6527: Red Hat Security Advisory: OpenShift Virtualization 4.11.0 RPMs security and bug fix update

Red Hat OpenShift Virtualization release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: golang: crash in a golang.org/x/crypto/ssh server

CVE-2022-31143: Do not expose CFG_GLPI on anonymous page · glpi-project/glpi@e66a0df

GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue.

CVE-2022-36093: XWIKI-19558: Only load vm templates in xpart.vm · xwiki/xwiki-platform@70c64c2

XWiki Platform Web Templates are templates for XWiki Platform, a generic wiki platform. By passing a template of the distribution wizard to the xpart template, user accounts can be created even when user registration is disabled. This also circumvents any email verification. Before versions 14.2 and 13.10.4, this can also be exploited on a private wiki, thus potentially giving the attacker access to the wiki. Depending on the configured default rights of users, this could also give attackers write access to an otherwise read-only public wiki. Users can also be created when an external authentication system like LDAP is configured, but authentication fails unless the authentication system supports a bypass/local accounts are enabled in addition to the external authentication system. This issue has been patched in XWiki 13.10.5 and 14.3RC1. As a workaround, one may replace `xpart.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.

Trojan-Ransom.Win32.Hive.bv MVID-2022-0636 Code Execution

Trojan-Ransom.Win32.Hive.bv malware suffers from a code execution vulnerability.

Trojan.Win32.Autoit.fhj MVID-2022-0638 NULL DACL

Trojan.Win32.Autoit.fhj malware creates two processes "xservice.exe" and a child process "xps.exe". The process creates an IPC pipe with a NULL DACL allowing RW for the Everyone user group.

Trojan-Spy.Win32.Pophot.bsl MVID-2022-0635 Insecure Permissions

Trojan-Spy.Win32.Pophot.bsl malware suffers from an insecure permissions vulnerability.

Backdoor.Win32.Hupigon.aspg MVID-2022-0634 Unquoted Service Path

Backdoor.Win32.Hupigon.aspg malware suffers from an unquoted service path vulnerability.

Backdoor.Win32.Winshell.5_0 MVID-2022-0633 Hardcoded Credential

Backdoor.Win32.Winshell.5_0 malware suffers from a hardcoded credential vulnerability.

CVE-2022-23683

Authenticated command injection vulnerabilities exist in the AOS-CX Network Analytics Engine via NAE scripts. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system, leading to a complete compromise of the switch running AOS-CX in ArubaOS-CX Switches version(s): AOS-CX 10.10.xxxx: 10.10.0002 and below, AOS-CX 10.09.xxxx: 10.09.1030 and below, AOS-CX 10.08.xxxx: 10.08.1070 and below, AOS-CX 10.06.xxxx: 10.06.0210 and below. Aruba has released upgrades for ArubaOS-CX Switch Devices that address these security vulnerabilities.