Fake celeb endorsements are luring social media users
Daily Archives: July 1, 2022
JAHx221 – RCE in copy/pasted PHP compat libraries, json_decode function
Posted by Eldar Marcussen on Jun 30
JAHx221 – RCE in copy/pasted PHP compat libraries, json_decode function
===============================================================================
Several PHP compatability libraries contain a potential remote code
execution
flaw in their `json_decode()` function based on having copy pasted existing
vulnerable code.
Identifiers
—————————————
* JAHx221 – http://www.justanotherhacker.com/advisories/JAHx221.txt…
Backdoor.Win32.EvilGoat.b / Weak Hardcoded Credentials
Posted by malvuln on Jun 30
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/20daf01e941f966b21a7ae431faefc65.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.EvilGoat.b
Vulnerability: Weak Hardcoded Credentials
Description: The malware listens on TCP port 13014. Authentication is
required, however the credentials “evilgoat / penix” are weak and found
within the PE…
Backdoor.Win32.Coredoor.10.a / Authentication Bypass
Posted by malvuln on Jun 30
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/49da40a2ac819103da9dc5ed10d08ddb.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Coredoor.10.a
Vulnerability: Authentication Bypass
Description: The malware runs an FTP server on TCP port 21000. Third-party
attackers who can reach infected systems can logon using any
username/password combination….
Backdoor.Win32.Cafeini.b / Weak Hardcoded Credentials
Posted by malvuln on Jun 30
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/a8fc1b3f7a605dc06a319bf0e14ca68b.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Cafeini.b
Vulnerability: Weak Hardcoded Credentials
Description: The malware listens on TCP ports 51966 and 23. Authentication
is required, however the password “mama” is weak and found within the PE
file….
BigBlueButton – Stored XSS in username (CVE-2022-31064)
Posted by Rick Verdoes via Fulldisclosure on Jun 30
CVE-2022-31064 – Stored Cross-Site Scripting in BigBlueButton.
=========================
Exploit Title: Stored Cross-Site Scripting (XSS) in BigBlueButton
Product: BigBlueButton
Vendor: BigBlueButton
Vulnerable Versions: 2.3, <2.4.8, <2.5.0
Tested Version: 2.4.7
Advisory Publication: Jun 22, 2022
Latest Update: Jun 22, 2022
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: CVE-2022-31064
CVSS Severity: High
CVSS…
typeorm CVE-2022-33171
Posted by lixts via Fulldisclosure on Jun 30
typeorm CVE-2022-33171
findOne(id), findOneOrFail(id)
The findOne function in TypeORM before 0.3.0 can either be supplied with a string or a FindOneOptions object. When
input to the function is a user-controlled parsed JSON object, supplying a crafted FindOneOptions instead of an id
string leads to SQL injection.
The issue was already fixed from version 0.3.0 onward when we encountered it.
Maintainer does not consider this a vulnerability…
🐞 CFP for Hardwear.io NL 2022 is OPEN!
Posted by Andrea Simonca on Jun 30
*🐞 CFP for Hardwear.io NL 2022 is OPEN!*
If you have groundbreaking embedded research or an awesome open-source tool
you’d like to showcase before the global hardware security community, this
is your chance. Send in your ideas on various hardware subjects, including
but not limited to Chips, Processors, ICS/SCADA, Telecom, Protocols &
Cryptography.
CFP is open until: 15 August 2022
Conference: 27-28 October 2022, The Hague (NL)
✅…
[Extension: CPSIoTSec 2022] The Workshop on CPS&IoT Security and Privacy **Submission Deadline: July 25, 2022**
Posted by alcaraz on Jun 30
[Apologies for cross-posting]
————————————————————————–
C a l l F o r P a p e r s
The Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2022), in
conjunction with the ACM Conference on Computer and Communications
Security (ACM CCS)
November 7-11, 2022, Los Angeles, U.S.A.
https://cpsiotsec2022.github.io/cpsiotsec/…
ZDI-22-945: Parallels Access Agent Uncontrolled Search Path Element Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Access Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.