A vulnerability has been discovered in Sophos Firewall’s user portal and Webadmin that could allow for arbitrary remote code execution. Sophos Firewall is a next generation firewall product which enables users to manage, detect and respond to threats on the network. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code in the context of the web application. Depending on the privileges associated with the application, an attacker could view, change, or delete data.
Category Archives: Advisories
Backdoor.Win32.Avstral.e / Unauthenticated Remote Command Execution
Posted by malvuln on Mar 28
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/35f0d754f161af35241cb081c73ea6dd.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Avstral.e
Vulnerability: Unauthenticated Remote Command Execution
Family: Avstral
Type: PE32
MD5: 35f0d754f161af35241cb081c73ea6dd
Vuln ID: MVID-2022-0529
Dropped files: mssys.exe
Disclosure: 03/27/2022
Description: The malware…
Backdoor.Win32.Chubo.c / Cross Site Scripting (XSS)
Posted by malvuln on Mar 28
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/c16b04a9879896ef453a6deb13528087_B.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Chubo.c
Vulnerability: Cross Site Scripting (XSS)
Family: Chubo
Type: Web Panel
MD5: c16b04a9879896ef453a6deb13528087
Vuln ID: MVID-2022-0528
Disclosure: 03/26/2022
Description: The malware listens on TCP port 81 and 8080. There…
Backdoor.Win32.Chubo.c / Unauthenticated Remote Command Execution
Posted by malvuln on Mar 28
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/c16b04a9879896ef453a6deb13528087.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Chubo.c
Vulnerability: Unauthenticated Remote Command Execution
Family: Chubo
Type: PE32
MD5: c16b04a9879896ef453a6deb13528087
Vuln ID: MVID-2022-0527
Disclosure: 03/26/2022
Description: The malware listens on TCP port 81 and 8080….
Backdoor.Win32.Cafeini.b / Weak Hardcoded Credentials
Posted by malvuln on Mar 28
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/b24c56abb4bde960c2d51d4e509d2c68_B.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Cafeini.b
Vulnerability: Weak Hardcoded Credentials
Family: Cafeini
Type: PE32
MD5: b24c56abb4bde960c2d51d4e509d2c68
Vuln ID: MVID-2022-0526
Disclosure: 03/25/2022
Description: The malware listens on TCP port 51966. Authentication…
Backdoor.Win32.Cafeini.b / Denial of Service
Posted by malvuln on Mar 28
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/b24c56abb4bde960c2d51d4e509d2c68.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Cafeini.b
Vulnerability: Denial of Service
Family: Cafeini
Type: PE32
MD5: b24c56abb4bde960c2d51d4e509d2c68
Vuln ID: MVID-2022-0525
Disclosure: 03/25/2022
Description: The malware listens on TCP port 51966 and is packed by a…
Backdoor.Win32.Cyn.20 / Insecure Permissions
Posted by malvuln on Mar 28
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/3dd1da64e306cae0409e154e15dd1b80.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Cyn.20
Vulnerability: Insecure Permissions
Description: The malware writes a “.EXE” file with insecure permissions to
c drive granting change (C) permissions to the authenticated user group.
Standard users can rename the…
Re: ImpressCMS: from unauthenticated SQL injection to RCE
Posted by Egidio Romano on Mar 28
Hello again,
Just wanted to let you know I updated the blog post with some more details:
apparently, this technique could be abused to bypass WAFs such as OWASP
ModSecurity CRS (Paranoia Level 1) and Cloudflare, check it out!
/EgiX
On Wed, Mar 23, 2022 at 3:07 PM Egidio Romano <research () karmainsecurity com>
wrote:
PHP filter_var vulnerability
Posted by Jordy Zomer on Mar 28
Hello!
When the filter_var function is used in conjunction with the flags FILTER_VALIDATE_DOMAIN and FILTER_FLAG_HOSTNAME,
there is a vulnerability in PHP that allows the filter to be bypassed. This vulnerability could be used to introduce
vulnerabilities into code that would otherwise be safe to use.
Due to the lack of response from the PHP security team, I have decided to make this vulnerability publicly available
instead. Especially…
USN-5353-1: Linux kernel (OEM) vulnerability
It was discovered that the IPsec implementation in the Linux kernel did not
properly allocate enough memory when performing ESP transformations,
leading to a heap-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code.