/ Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server
https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/
https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
/ An integer underflow in WhatsApp for Android prior to v2.22.16.2, WhatsApp for iOS v2.22.15.9 could have caused remote code execution when receiving a crafted video file.
https://www.whatsapp.com/security/advisories/2022/
https://www.whatsapp.com/security/advisories/2022/
WhatsApp.com
WhatsApp Security Advisories 2022
WhatsApp Security Advisories 2022 - List of security fixes for WhatsApp products
Open SysConf'22 - Анонс всех докладов на завтра (14 Октября)
До дня Х осталось меньше суток, завтра по плану будет:
— 11:00 - Вступительное слово
— 11:15 - Сабыржан "novitoll" Тасболатов: Практический опыт с 4G, 5G
— 12:15 - Нурбиби "R0b0Cat": Шаблонизация Linux систем в организациях
— 13:00 - Обед
— 14:00 - Дмитрий "ватман": CDC
— 14:50 - Kutlymurat "manfromkz" Mambetniyazov: История одного CVE
— 15:20 - Roman "sysroman": Ansible AWX by Oracle
— 15:45 - кофе-брейк
— 16:00 - Shelldon "Sh3lldon": DEP vs ROP
— 16:50 - Ilyas B Arinov "t2micro": Старый... Но не бесполезный IRC
— 17:20 - Айдар Оспанбеков: Сети (хуети) в современном датацентре
— 18:05 - Yevgeniy "sysadminkz": Неявный превентинг констракшн
План может меняться, уж не обессудьте. Заряжаем себя и друзей, находим силы и возможности и проводим нашу встречу в добром здравии и отношении.
☀️ Завтра встречаем Вас на первом этаже - ул. Байзакова 280 в SmartPoint, г.Алматы
⚡️ Кто не зарегистрировался, зарегистрируйтесь пожалуйста иначе мест Вам может не хватить, детали здесь: https://sysconf.io
Всем Peace ✌️
P.S. Зал SmartArt
До дня Х осталось меньше суток, завтра по плану будет:
— 11:00 - Вступительное слово
— 11:15 - Сабыржан "novitoll" Тасболатов: Практический опыт с 4G, 5G
— 12:15 - Нурбиби "R0b0Cat": Шаблонизация Linux систем в организациях
— 13:00 - Обед
— 14:00 - Дмитрий "ватман": CDC
— 14:50 - Kutlymurat "manfromkz" Mambetniyazov: История одного CVE
— 15:20 - Roman "sysroman": Ansible AWX by Oracle
— 15:45 - кофе-брейк
— 16:00 - Shelldon "Sh3lldon": DEP vs ROP
— 16:50 - Ilyas B Arinov "t2micro": Старый... Но не бесполезный IRC
— 17:20 - Айдар Оспанбеков: Сети (хуети) в современном датацентре
— 18:05 - Yevgeniy "sysadminkz": Неявный превентинг констракшн
План может меняться, уж не обессудьте. Заряжаем себя и друзей, находим силы и возможности и проводим нашу встречу в добром здравии и отношении.
☀️ Завтра встречаем Вас на первом этаже - ул. Байзакова 280 в SmartPoint, г.Алматы
⚡️ Кто не зарегистрировался, зарегистрируйтесь пожалуйста иначе мест Вам может не хватить, детали здесь: https://sysconf.io
Всем Peace ✌️
P.S. Зал SmartArt
Sys-Admin InfoSec pinned «Open SysConf'22 - Анонс всех докладов на завтра (14 Октября) До дня Х осталось меньше суток, завтра по плану будет: — 11:00 - Вступительное слово — 11:15 - Сабыржан "novitoll" Тасболатов: Практический опыт с 4G, 5G — 12:15 - Нурбиби "R0b0Cat": Шаблонизация…»
/ Alchimist: A new attack framework in Chinese for Mac, Linux and Window
https://blog.talosintelligence.com/2022/10/alchimist-offensive-framework.html
https://blog.talosintelligence.com/2022/10/alchimist-offensive-framework.html
Cisco Talos Blog
Alchimist: A new attack framework in Chinese for Mac, Linux and Windows
Cisco Talos discovered a new attack framework including a command and control (C2) tool called "Alchimist" and a new malware "Insekt" with remote administration capabilities.
/ Various Linux Kernel WLAN security issues (RCE/DOS) found
https://www.openwall.com/lists/oss-security/2022/10/13/2
https://www.openwall.com/lists/oss-security/2022/10/13/2
/ Threat Alert: Private npm Packages Disclosed via Timing Attacks
https://blog.aquasec.com/private-packages-disclosed-via-timing-attack-on-npm
https://blog.aquasec.com/private-packages-disclosed-via-timing-attack-on-npm
Aqua
Threat Alert: Private npm Packages Disclosed via Timing Attacks
Via timing attacks, threat actors create phony public npm packages masked as private ones to deceive developers into downloading compromised packages
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
FortiOS, FortiProxy, and FortiSwitchManager Authentication Bypass Technical Deep Dive (CVE-2022-40684)
PoC
https://www.horizon3.ai/fortios-fortiproxy-and-fortiswitchmanager-authentication-bypass-technical-deep-dive-cve-2022-40684/
PoC
https://www.horizon3.ai/fortios-fortiproxy-and-fortiswitchmanager-authentication-bypass-technical-deep-dive-cve-2022-40684/
Horizon3.ai
FortiOS, FortiProxy, and FortiSwitchManager Authentication Bypass Technical Deep Dive (CVE-2022-40684)
Fortinet recently patched a critical authentication bypass vulnerability that gives an attacker the ability to login as an administrator,
/ Zimbra - Attacker managed to upload files into Web Client directory
https://forums.zimbra.org/viewtopic.php?t=71153
https://forums.zimbra.org/viewtopic.php?t=71153
/ A vulnerability was found in Zoom Client for Meetings up to 5.11.x on macOS (Unified Communication Software). It has been classified as critical
...debugging port misconfiguration..:
https://vuldb.com/?id.210867
...debugging port misconfiguration..:
https://vuldb.com/?id.210867
Vuldb
CVE-2022-28762 Zoom Client for Meetings Debugging Port config
A vulnerability was found in Zoom Client for Meetings up to 5.11.x on macOS. It has been classified as critical. This vulnerability is uniquely identified as CVE-2022-28762. It is recommended to upgrade the affected component. Statistical analysis made it…
/ Introducing the Fleet Public Preview
I tried it.. Not bad.. not bad:
https://blog.jetbrains.com/fleet/2022/10/introducing-the-fleet-public-preview/
Additional info:
https://www.jetbrains.com/fleet/
I tried it.. Not bad.. not bad:
https://blog.jetbrains.com/fleet/2022/10/introducing-the-fleet-public-preview/
Additional info:
https://www.jetbrains.com/fleet/
The JetBrains Blog
Introducing the Fleet Public Preview | The Fleet Blog
Since the initial announcement of Fleet, we have had an overwhelming amount of interest from all of you, with over 137,000 people signing up for the private preview. Our reason for starting with a clo
/ Microsoft Office 365 Message Encryption Insecure Mode of Operation
https://labs.withsecure.com/advisories/microsoft-office-365-message-encryption-insecure-mode-of-operation
https://labs.withsecure.com/advisories/microsoft-office-365-message-encryption-insecure-mode-of-operation
Withsecure
Microsoft Office 365 Message Encryption Insecure Mode of Operation
Microsoft Office 365 Message Encryption (OME) utilitises Electronic Codebook (ECB) mode of operation. This mode is insecure and leaks information about the structure of the messages sent and can lead to partial or full message disclosure.
/ Git security vulnerabilities announced
Today, the Git project released new versions to address a pair of security vulnerabilities (CVE-2022-39253, and CVE-2022-39260) that affect versions 2.38 and older. These affect Git’s --local clone optimization and git shell‘s interactive command mode:
https://github.blog/2022-10-18-git-security-vulnerabilities-announced
Today, the Git project released new versions to address a pair of security vulnerabilities (CVE-2022-39253, and CVE-2022-39260) that affect versions 2.38 and older. These affect Git’s --local clone optimization and git shell‘s interactive command mode:
https://github.blog/2022-10-18-git-security-vulnerabilities-announced
The GitHub Blog
Git security vulnerabilities announced
Upgrade your local installation of Git, especially when cloning with --recurse-submodules from untrusted repositories, or if you use git shell interactive mode.
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
How We Managed to Abuse a Custom Role User Using CSTI and Stored XSS in Azure Fabric Explorer
https://orca.security/resources/blog/fabrixss-vulnerability-azure-fabric-explorer/
https://orca.security/resources/blog/fabrixss-vulnerability-azure-fabric-explorer/
Orca Security
FabriXss: Azure Fabric Explorer Exploit | Orca Research Pod
The Orca Research Pod has discovered FabriXss, a vulnerability in Azure Service Fabric Explorer that allows attackers to gain full administrator permissions.
/ New Fully Undetectable PowerShell Backdoor (high-level overview FUD PowerShell backdoor)
In this research report, we will provide a high-level overview of this FUD PowerShell backdoor, including when it first appeared and what it does. We’ll also provide insight into the operations security mistakes made by the threat actor responsible for the tool that we were able to logically exploit to access and decrypt the encrypted C2 commands for each victim. One of the commands is an execution of a full PowerShell code for Active Directory users enumeration and remote desktop enumeration, which probably will be used later in a lateral movement phase…
https://www.safebreach.com/resources/blog/safebreach-labs-researchers-uncover-new-fully-undetectable-powershell-backdoor/
In this research report, we will provide a high-level overview of this FUD PowerShell backdoor, including when it first appeared and what it does. We’ll also provide insight into the operations security mistakes made by the threat actor responsible for the tool that we were able to logically exploit to access and decrypt the encrypted C2 commands for each victim. One of the commands is an execution of a full PowerShell code for Active Directory users enumeration and remote desktop enumeration, which probably will be used later in a lateral movement phase…
https://www.safebreach.com/resources/blog/safebreach-labs-researchers-uncover-new-fully-undetectable-powershell-backdoor/
SafeBreach
SafeBreach Uncovers Fully Undetectable PowerShell Backdoor | New Research
SafeBreach Labs discovered a novel, fully undetectable PowerShell backdoor disguised as part of the Windows update process.
Netlas.io - Discover, Research and Monitor any Assets Available Online
Internet intelligence apps that provide accurate technical information on IP addresses, domain names, websites, web applications, IoT devices, and other online assets:
• Web crawler
• Domain names
• DNS lookups
• Whois
• Internet scanner
This service has API and Free "Community" access for registered users:
• Tool: https://app.netlas.io/
Internet intelligence apps that provide accurate technical information on IP addresses, domain names, websites, web applications, IoT devices, and other online assets:
• Web crawler
• Domain names
• DNS lookups
• Whois
• Internet scanner
This service has API and Free "Community" access for registered users:
• Tool: https://app.netlas.io/
/ K30425568: Overview of F5 vulnerabilities (October 2022)
https://support.f5.com/csp/article/K30425568
https://support.f5.com/csp/article/K30425568
/ New Scanner For Text4shell
https://blog.silentsignal.eu/2022/10/18/our-new-scanner-for-text4shell/
Additionl info - CVE-2022-42889: Keep Calm and Stop Saying "4Shell”
https://www.rapid7.com/blog/post/2022/10/17/cve-2022-42889-keep-calm-and-stop-saying-4shell/
https://blog.silentsignal.eu/2022/10/18/our-new-scanner-for-text4shell/
Additionl info - CVE-2022-42889: Keep Calm and Stop Saying "4Shell”
https://www.rapid7.com/blog/post/2022/10/17/cve-2022-42889-keep-calm-and-stop-saying-4shell/
Rapid7
CVE-2022-42889 Update: Keep Calm and Stop Saying "Text4Shell" | Rapid7 Blog
/ Vulnerability Spotlight: Vulnerabilities in Abode Systems home security kit could allow attacker to take over cameras, remotely disable them
https://blog.talosintelligence.com/2022/10/vuln-spotlight-abode-.html
https://blog.talosintelligence.com/2022/10/vuln-spotlight-abode-.html
/ “Dormant Colors”: Live Campaign With Over 1M Data Stealing Extensions Installed
Evil browser extention, technical analysis:
https://guardiosecurity.medium.com/dormant-colors-live-campaign-with-over-1m-data-stealing-extensions-installed-9a9a459b5849
Evil browser extention, technical analysis:
https://guardiosecurity.medium.com/dormant-colors-live-campaign-with-over-1m-data-stealing-extensions-installed-9a9a459b5849
Medium
“Dormant Colors”: Live Campaign With Over 1M Data Stealing Extensions Installed
By Nati Tal (Guardio Labs) — BadEx II