Site icon TheCyberThrone

TheCyberThrone Security Week In Review – December 2nd & 10th, 2023

Advertisements

Apache Struts fixes Critical Vulnerability – CVE-2023-50164

Researchers have identified a critical vulnerability in Apache Struts that could lead to unauthorised path traversal. This means an attacker can exploit these parameters to navigate the server’s directory structure and upload a malicious file. Once deployed, can lead to Remote Code Execution remote code execution.

The security flaw, identified as CVE-2023-50164, poses a severe threat to systems running certain versions of Apache Struts. This vulnerability is rooted in the framework’s handling of file upload parameters, which, if manipulated, can lead to unauthorized path traversal.

Advertisements

LogoFAIL Firmware Attack

Researchers has identified numerous security vulnerabilities collectively known as LogoFAIL enable malicious actors to interfere with the booting process of computer devices and implant bootkits, owing to issues related to image analysis components used by motherboard manufacturers for displaying brand logos at computer startup. Devices with both x86 and ARM architectures are at risk.

The possibility of attacking a computer’s built-in boot interface in such a manner was demonstrated as far back as 2009, when researchers Rafal Wojtczuk and Alexander Tereshkin showed how a bug in the BMP image analyzer could be used to infect BIOS with malware.

The discovery of LogoFAIL vulnerabilities began as a small research project examining attack surfaces through image analysis components in the context of custom or legacy code for analysis in embedded UEFI software. Researchers discovered that an attacker could store a malicious image or logo in the EFI system partition or in unsigned firmware update partitions.

SUBSCRIBE TO OUR BLOG TODAY !

We understand the importance of staying on top of the latest threats and vulnerabilities that can harm your digital life. You’ll receive the latest cybersecurity news, insights, resources, offers and analysis straight to your inbox every day

POC released for Splunk Enterprise Vulnerability- CVE-2023-46214

Splunk Enterprise is a log management solution that ingests a variety of data generated by an organization’s business infrastructure and applications and used to generate helpful insights for improving the organization’s security and compliance, application delivery, IT operations.

The vulnerability tracked as CVE-2023-46214 resides while Splunk Enterprise’s failure to safely sanitize extensible stylesheet language transformations (XSLT) that users supply. This enables attackers to upload malicious XSLT, which can result in remote code execution on the Splunk Enterprise instance.

Microsoft Echo’s on APT 28 exploiting CVE-2023-23397

Microsoft’s Threat Intelligence (MSIRT) comes up with a warning of Russia-linked cyber-espionage group APT28 (aka Fancybear) actively exploiting the CVE-2023-23397 Outlook flaw to hijack Microsoft Exchange accounts and steal sensitive information.

Active since 2007, the APT28 group targeted governments, militaries, and security organizations worldwide. The group was also involved in the string of attacks that targeted 2016 presidential election. Most of the APT28s’ campaigns leveraged spear-phishing and malware-based attacks.

The researchers note that the attackers also commonly employed multiple known vulnerabilities, including CVE-2023-38831 in WinRAR or CVE-2021-40444 in Windows MSHTML.

Advertisements

Atlassian fixes critical RCE vulnerabilities in its products

Atlassian has fixed four critical vulnerabilities in its software that could result in remote code execution.

Exit mobile version