https://techcrunch.com/2025/10/07/security-bug-in-indias-income-tax-portal-exposed-taxpayers-sensitive-data/
#security #India #government #informationdisclosure #idol #taxes
Here's something that wasn't on your bingo card. Secrets, like API keys were gobbled up in a huge dataset used to train most GenAI models. People leave them in GitHub, then the model absorbs the code, and bobs your uncle.
https://thehackernews.com/2025/02/12000-api-keys-and-passwords-found-in.html?m=1
Hackers exploit critical D-Link DIR-859 router flaw to steal passwords
#ACTIVELYEXPLOITED #DLINK #HARDWARE #INFORMATIONDISCLOSURE https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-d-link-dir-859-router-flaw-to-steal-passwords/
Check Point Vulnerability Report: CVE-2024-24919
Date: May 29, 2024
CVE: CVE-2024-24919
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
CWE: [[CWE-22]], [[CWE-425]]
Sources: Check Point, [Tenable](CVE-2024-24919 | Tenable®) Tenable Blog
Synopsis
A critical vulnerability (CVE-2024-24919) has been identified in Check Point's CloudGuard Network Security appliance, allowing unauthorized actors to access sensitive information.
Issue Summary
The vulnerability, categorized as an 'Exposure of Sensitive Information to an Unauthorized Actor,' affects Check Point's CloudGuard Network Security appliances. Attackers can exploit this vulnerability to read sensitive information from gateways connected to the Internet and enabled with Remote Access VPN or Mobile Access. The flaw is actively exploited in the wild, making it a high-priority issue for administrators.
Technical Key Findings
The vulnerability arises from a path traversal issue in the appliance's handling of certain HTTP requests. Attackers can manipulate the request paths to access files on the device, bypassing standard access controls. The exploit involves sending crafted HTTP requests to the vulnerable endpoint, allowing unauthorized file reads.
Vulnerable Products
Impact Assessment
Exploiting this vulnerability can lead to unauthorized access to sensitive information, such as configuration files and password hashes. This could potentially escalate to full system compromise if critical files are accessed and misused.
Patches or Workaround
Check Point has released a hotfix to address this vulnerability. Administrators are urged to apply the patch immediately. The company also recommends placing the vulnerable gateway behind another security gateway with IPS and SSL inspection enabled as a temporary mitigation.
Tags
#CheckPoint #CVE-2024-24919 #InformationDisclosure #PathTraversal #NetworkSecurity #CloudGuard #SecurityPatch #VulnerabilityManagement #threatintelligence
VMware Patches Severe Security Flaws in Workstation and Fusion Products
Date: May 2024
CVE: CVE-2024-22267, CVE-2024-22268, CVE-2024-22269, CVE-2024-22270
Vulnerability Type: Use-After-Free, Heap Buffer Overflow, Information Disclosure
CWE: [[CWE-416]], [[CWE-122]], [[CWE-200]]
Sources: The Hacker News, Broadcom advisory
Issue Summary
Multiple severe security vulnerabilities have been identified in VMware Workstation and Fusion products. These vulnerabilities could potentially allow threat actors to execute arbitrary code, access sensitive information, and trigger denial-of-service (DoS) conditions. The affected versions include Workstation 17.x and Fusion 13.x.
Technical Key Findings
The vulnerabilities include a use-after-free issue in the Bluetooth device (CVE-2024-22267), a heap buffer overflow in the shader functionality (CVE-2024-22268), and two information disclosure flaws (CVE-2024-22269 and CVE-2024-22270). Exploiting these vulnerabilities requires local administrative privileges on a virtual machine, potentially allowing attackers to manipulate the VM's VMX process.
|VMware Product|Version|Running On|CVE|CVSSv3|Severity|Fixed Version|Workarounds|Additional Documentation|
|---|---|---|---|---|---|---|---|---|
|Workstation|17.x|Any|CVE-2024-22267|9.3|Critical|17.5.2|KB91760|None|
|Fusion|13.x|OS X|CVE-2024-22267|9.3|Critical|13.5.2|KB91760|None|
| VMware Product | Version | Running On | CVE | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
| -------------- | ------- | ---------- | -------------- | --------------------------------------------------------------------------------------------- | --------- | ------------- | ------------------------------------------------ | ------------------------ |
| Workstation | 17.x | Windows | CVE-2024-22268 | 7.1 | Important | 17.5.2 | KB59146 | None |
| Fusion | 13.x | OS X | CVE-2024-22268 | 7.1 | Important | 13.5.2 | KB59146 | None |
|VMware Product|Version|Running On|CVE|CVSSv3|Severity|Fixed Version|Workarounds|Additional Documentation|
|---|---|---|---|---|---|---|---|---|
|Workstation|17.x|Any|CVE-2024-22269|7.1|Important|17.5.2|KB91760|None|
|Fusion|13.x|OS X|CVE-2024-22269|7.1|Important|13.5.2|KB91760|None|
| VMware Product | Version | Running On | CVE | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
| -------------- | ------- | ---------- | -------------- | --------------------------------------------------------------------------------------------- | --------- | ------------- | ----------- | ------------------------ |
| Workstation | 17.x | Any | CVE-2024-22270 | 7.1 | Important | 17.5.2 | None | None |
| Fusion | 13.x | OS X | CVE-2024-22270 | 7.1 | Important | 13.5.2 | None | None |
Vulnerable Products
Impact Assessment
Exploiting these vulnerabilities could lead to significant security breaches, including arbitrary code execution on the host machine, sensitive data exposure, and system crashes. The critical nature of these flaws underscores the need for immediate remediation to prevent potential attacks.
Patches or Workarounds
VMware has released patches for these vulnerabilities in versions 17.5.2 (Workstation) and 13.5.2 (Fusion). As temporary measures, users are advised to disable Bluetooth support and 3D acceleration features on virtual machines. However, there is no workaround for CVE-2024-22270.
Tags
#VMware #CVE-2024-22267 #CVE-2024-22268 #CVE-2024-22269 #CVE-2024-22270 #UseAfterFree #HeapBufferOverflow #InformationDisclosure #Virtualization #Workstation #Fusion #SecurityPatch
Wall-Escape Vulnerability Analysis: Implications and Mitigation Strategies
Date: February 27, 2024
CVE: CVE-2024-28085
Vulnerability Type: [[Command Injection]]
CWE: [[CWE-77]], [[CWE-78]], [[CWE-88]]
Sources: [SANS Wall-Escape (CVE-2024-28085)](https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
Issue Summary
Wall-Escape (CVE-2024-28085) unveils a critical flaw in the wall command from the util-linux package, allowing unprivileged users to execute command-line arguments without proper escape sequence filtering. This vulnerability has existed since 2013, posing a significant risk on systems where wall is setgid and mesg is set to 'y', notably Ubuntu 22.04 and Debian Bookworm.
Technical Key findings
The flaw arises from the mishandling of command-line arguments (argv), which are not sanitized for escape sequences. This oversight enables attackers to inject arbitrary text onto terminals of other users, potentially leading to information leakage or clipboard alteration. The vulnerability is exploitable through crafted wall command executions, leveraging system features to extract sensitive information such as user passwords.
Vulnerable products
Impact assessment
Successful exploitation can lead to unauthorized information disclosure and manipulation of terminal sessions. On Ubuntu 22.04, attackers can deceive users into revealing passwords. The vulnerability also enables clipboard content alteration on certain terminal emulators.
Patches or workaround
No specific patches were mentioned for CVE-2024-28085. Users are advised to restrict access to the wall command and monitor systems for unusual terminal behavior indicative of exploitation attempts.
Tags
#CVE-2024-28085 #CommandInjection #Ubuntu #Debian #InformationDisclosure #util-linux #TerminalSecurity
My home office window faces my neighbor’s house, and their external dryer vent is right at my eye level.
As it flaps, I know they are drying a load of laundry.
I am not sure what to do with this #InformationDisclosure
"🚨 Exim Mail Servers Under Siege: New Critical Flaws Unearthed 🚨"
A recent disclosure has unveiled multiple security vulnerabilities in the Exim mail transfer agent, posing a significant threat to information disclosure and remote code execution. The flaws, reported anonymously in June 2022, include:
The most severe among these is CVE-2023-42115, enabling remote, unauthenticated attackers to execute arbitrary code on affected Exim installations. The Exim maintainers have already provided fixes for some of these vulnerabilities, while discussions are ongoing regarding the remaining issues.
This disclosure follows a history of security flaws in Exim, including the notorious 21Nails vulnerabilities and a critical Exim vulnerability (CVE-2019-10149, CVSS score: 9.8) exploited by the state-sponsored Sandworm group from Russia.
Source: The Hacker News
Tags: #Exim #CyberSecurity #Vulnerabilities #RemoteCodeExecution #InformationDisclosure #CVE202342115 #CVE202342116 #CVE202342117 #CVE202342118 #CVE202342119 #CVE202342114 🛡️💻🔓
Has Toll learnt any lessons? I guess not. #InformationDisclosure
Critical Bugs in Dell Wyse Thin Clients Allow Code Execution, Client Takeovers - The bugs rate 10 out of 10 on the vulnerability-severity scale, thanks to the ease of exploitation... https://threatpost.com/critical-bugs-dell-wyse-thin-clients/162452/ #criticalsecurityvulnerabilities #informationdisclosure #configurationfiles #noauthentication #vulnerabilities #readwriteaccess #cloudsecurity #thinclients #version9.x #ftpserver #dellwyse #patch #bugs
Electronic Medical Records Cracked Open by OpenClinic Bugs - Four security vulnerabilities in an open-source medical records management platform allow remote c... https://threatpost.com/electronic-medical-records-openclinic-bugs/161722/ #personalhealthinformation #electronicmedicalrecords #medicalrecordsmanagement #securityvulnerabilities #informationdisclosure #patientdatatheft #vulnerabilities #cve-2020-28937 #cve-2020-28938 #cve-2020-28939 #opensource #openclinic #bishopfox #unpatched
GO SMS Pro Android App Exposes Private Photos, Videos and Messages - The vulnerable version of the app, which has 100 million users, uses easily predictable URLs to li... https://threatpost.com/go-sms-pro-android-app-exposes-private-photos/161407/ #informationdisclosure #securityvulnerability #mediacontentexposure #trustwavespiderlabs #mobilemessagingapp #vulnerabilities #predictableurls #mobilesecurity #privatephotos #websecurity #googleplay #gosmspro #privacy #android #patch
WordPress Sites Open to Code Injection Attacks via Welcart e-Commerce Bug - The shopping cart application contains a PHP object-injection bug. https://threatpost.com/wordpress_open_to_attacks_welcart_bug/161037/ #informationdisclosure #securityvulnerability #phpobjectinjection #vulnerabilities #denialofservice #codeinjection #websecurity #e-commerce #wordfence #wordpress #welcart #plugin #patch #bug
Adobe Warns Windows, MacOS Users of Critical Acrobat and Reader Flaws - The critical-severity Adobe Acrobat and Reader vulnerabilities could enable arbitrary code executi... https://threatpost.com/adobe-windows-macos-critical-acrobat-reader-flaws/160903/ #november2020patchupdate #securityvulnerabilities #arbitrarycodeexecution #adobeacrobatandreader #informationdisclosure #acrobatandreader #vulnerabilities #cve-2020-24430 #cve-2020-24435 #cve-2020-24436 #cve-2020-24437 #criticalbugs
Bug-Bounty Awards Spike 26% in 2020 - The most-rewarded flaw is XSS, which is among those that are relatively cheap for organizations to... https://threatpost.com/bug-bounty-awards-spike-2020/160719/ #mostrecentthreatlists #informationdisclosure #cross-sitescripting #stayathomeorders #vulnerabilities #ethicalhackers #bountypayouts #most-rewarded #mostvaluable #bugbounty #hackerone #covid-19 #security #tiktok #apple #flaws #top10 #xss
Google Rolls Out Fixes for High-Severity Android System Flaws - The most serious bugs are elevation-of-privilege issues in the Android System component (CVE-2020-... https://threatpost.com/google-android-system-flaws/159948/ #androidsecurityupdate #informationdisclosure #elevationofprivilege #vulnerabilities #(cve-2020-0215 #mediaframework #cve-2020-0416 #websecurity #october2020 #framework #qualcomm #android #samsung #google #kernel #pixel
90 days, 16 bugs, and an Azure Sphere Challenge - Cisco Talos reports 16 vulnerabilities in Microsoft Azure Sphere's sponsored research challenge.
By ... http://feedproxy.google.com/~r/feedburner/Talos/~3/n4-X8h4AfAA/Azure-Sphere-Challenge.html #informationdisclosure #unsignedcodeexecution #vulnerabilityanalysis #privilegeescalation #denialofservice #microsoftazure #vulnspotlight #vulnerability #vulndev #talos
Critical Adobe Flaws Allow Attackers to Run JavaScript in Browsers - Five critical cross-site scripting flaws were fixed by Adobe in Experience Manager as part of its ... https://threatpost.com/critical-adobe-flaws-attackers-javascript-browsers/159026/ #adobeexperiencemanager #informationdisclosure #crosssitescripting #htmlinjectionflaw #vulnerabilities #adobeframemaker #adobeindesign #browserattack #criticalflaw #patchtuesday #websecurity #adobepatch #javascript #adobebug #adobe #xss
Researchers Warn of Flaw Affecting Millions of IoT Devices - A patch has been issued for the flaw in a widely-used module, and researchers are urging IoT manuf... https://threatpost.com/flaw-affecting-millions-iot-devices/158472/ #informationdisclosure #cinterionehs8module #internetofthings #cve-2020-15858 #remoteexploit #vulnerability #insulinpump #smartcity #thales #hacks #patch #iot #fix