Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

CVE-2022-41874: The Filesystem Scope can be Partially Bypassed

Tauri is a framework for building binaries for all major desktop platforms. In versions prior to 1.0.7 and 1.1.2, Tauri is vulnerable to an Incorrectly-Resolved Name. Due to incorrect escaping of special characters in paths selected via the file dialog and drag and drop functionality, it is possible to partially bypass the `fs` scope definition. It is not possible to traverse into arbitrary paths, as the issue is limited to neighboring files and sub folders of already allowed paths. The impact differs on Windows, MacOS and Linux due to different specifications of valid path characters. This bypass depends on the file picker dialog or dragged files, as user selected paths are automatically added to the allow list at runtime. A successful bypass requires the user to select a pre-existing malicious file or directory during the file picker dialog and an adversary controlled logic to access these files. The issue has been patched in versions 1.0.7, 1.1.2 and 1.2.0. As a workaround, disable ...

CVE
#mac#windows#linux#js#perl
CVE-2022-43074: AnyaCMS v3.1.2 has an Arbitrary File Upload Vulnerability · Issue #3 · loadream/AyaCMS

AyaCMS v3.1.2 was discovered to contain an arbitrary file upload vulnerability via the component /admin/fst_upload.inc.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.

GitHub Abused to Distribute Malicious Packages on PyPI in Image Files

By Waqas Threat actors are using steganography to hide malicious code in images. This is a post from HackRead.com Read the original post: GitHub Abused to Distribute Malicious Packages on PyPI in Image Files

Rezilion Expands Dynamic SBOM Capability to Support Windows Environments

Technology consolidates Windows and Linux software risk together in one UI, helping teams manage vulnerabilities and comply with new regulatory standards.

Windows Kernel Long Registry Key / Value Out-Of-Bounds Read

The Windows kernel suffers from out-of-bounds reads and other issues when operating on long registry key and value names.

HEUR:Trojan.MSIL.Agent.gen MVID-2022-0654 Information Disclosure

HEUR:Trojan.MSIL.Agent.gen malware suffers from an information disclosure vulnerability.

Windows Kernel Long Registry Path Memory Corruption

The Windows kernel suffers from multiple memory corruption vulnerabilities when operating on very long registry paths.

GHSA-p2jh-44qj-pf2v: Exfiltration of hashed SMB credentials on Windows via file:// redirect

### Impact When following a redirect, Electron delays a check for redirecting to file:// URLs from other schemes. The contents of the file is not available to the renderer following the redirect, but if the redirect target is a SMB URL such as `file://some.website.com/`, then in some cases, Windows will connect to that server and attempt NTLM authentication, which can include sending hashed credentials. ### Patches This issue has been fixed in all current stable versions of Electron. Specifically, these versions contain the fixes: - 21.0.0-beta.1 - 20.0.1 - 19.0.11 - 18.3.7 We recommend all apps upgrade to the latest stable version of Electron. ### Workarounds If upgrading isn't possible, this issue can be addressed without upgrading by preventing redirects to file:// URLs in the `WebContents.on('will-redirect')` event, for all WebContents: ```js app.on('web-contents-created', (e, webContents) => { webContents.on('will-redirect', (e, url) => { if (/^file:/.test(url)) e.preve...

CVE-2022-45130: Compromising Plesk via its REST API

Plesk Obsidian allows a CSRF attack, e.g., via the /api/v2/cli/commands REST API to change an Admin password. NOTE: Obsidian is a specific version of the Plesk product: version numbers were used through version 12, and then the convention was changed so that versions are identified by names ("Obsidian"), not numbers.

Patch ASAP: Critical Citrix, VMware Bugs Threaten Remote Workspaces With Takeover

Hole-y software alert, Batman: Cybercriminal faves Citrix Gateway and VMware Workspace ONE have authentication-bypass bugs that could offer up total access to attackers.