What is the vulnerability?The CVE-2023-32315 is a path traversal vulnerability that affects all Openfire versions since version 3.1.0. Successful exploitation of this vulnerability can allow attackers to bypass authentication and gain access to sections of the restricted Openfire Admin Console. CISA recently added CVE-2023-32315 to the Known Exploited Vulnerabilities catalog, which means that the vulnerability has been observed to be exploited in the wild. What is the recommended Mitigation?The vendor released Openfire version 4.6.8 and 4.7.5 that contains a fix in mid 2023. More information could be found here: https://github.com/igniterealtime/Openfire/security/advisories/GHSA-gw42-f939-fhvmWhat FortiGuard Coverage is available?FortiGuard Labs has an existing “Openfire.setup.CVE-2023-32315.Authentication.Bypass” IPS signature released since August 2023.
Category Archives: Advisories
et-6.2.8-2.el8
FEDORA-EPEL-2024-f282573e05
Packages in this update:
et-6.2.8-2.el8
Update description:
Update to 6.2.8, fixing CVE-2022-48257 and CVE-2022-48258
pypy-7.3.15-3.fc40
FEDORA-2024-612986fdfa
Packages in this update:
pypy-7.3.15-3.fc40
Update description:
Security fix for CVE-2023-5752 (in the bundled pip).
pypy-7.3.15-3.fc39
FEDORA-2024-dada06a500
Packages in this update:
pypy-7.3.15-3.fc39
Update description:
Security fix for CVE-2023-5752 (in the bundled pip).
pypy-7.3.15-3.fc38
FEDORA-2024-797928fed3
Packages in this update:
pypy-7.3.15-3.fc38
Update description:
Security fix for CVE-2023-5752 (in the bundled pip).
Microsoft PlayReady white-box cryptography weakness
Posted by Security Explorations on May 01
Hello All,
There is yet another attack possible against Protected Media Path
process beyond the one involving two global XOR keys [1]. The new
attack may also result in the extraction of a plaintext content key
value.
The attack has its origin in a white-box crypto [2] implementation.
More specifically, one can devise plaintext content key from white-box
crypto data structures of which goal is to make such a reconstruction
difficult / not…
pypy-7.3.15-3.fc41
FEDORA-2024-305522ab38
Packages in this update:
pypy-7.3.15-3.fc41
Update description:
Automatic update for pypy-7.3.15-3.fc41.
Changelog
* Tue Apr 30 2024 Charalampos Stratakis <cstratak@redhat.com> – 7.3.15-3
– Security fix for CVE-2023-5752 for the bundled pip wheel
– Resolves: rhbz#2250771
ZDI-24-419: (Pwn2Own) Xiaomi Pro 13 GetApps integral-dialog-page Cross-Site Scripting Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xiaomi Pro 13 smartphones. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-4406.
ZDI-24-418: (Pwn2Own) Xiaomi Pro 13 mimarket manual-upgrade Cross-Site Scripting Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xiaomi Pro 13 smartphones. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-4405.
ZDI-24-417: Xiaomi Pro 13 isUrlMatchLevel Permissive List of Allowed Inputs Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xiaomi Pro 13 smartphones. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-26322.