Cross-site scripting (XSS) vulnerability in the Save Filters functionality in the WP Slimstat plugin before 3.9.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the fs[resource] parameter in the wp-slim-view-2 page to wp-admin/admin.php.
Monthly Archives: January 2015
SA-CONTRIB-2015-024 – Alfresco – Cross Site Request Forgery (CSRF)
- Advisory ID: DRUPAL-SA-CONTRIB-2015-024
- Project: Alfresco (third-party module)
- Version: 6.x
- Date: 2015-January-21
- Security risk: 13/25 ( Moderately Critical) AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:All
- Vulnerability: Cross Site Request Forgery
Description
The Alfresco module provides integration between Drupal and Alfresco via Content Management Web Services (SOAP) and Repository RESTful API. The Alfresco Browser submodule provides an AJAX-based repository browser that allows users to visualize, upload, search and retrieve nodes from the Alfresco repository.
Some links from Alfresco Browser were not properly protected from CSRF. A malicious user could cause a user to delete alfresco nodes by getting the user’s browser to make a request to a specially-crafted URL while the user was logged in.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance
with Drupal Security Team processes.
Versions affected
- Alfresco 6.x-1.x versions prior to 6.x-1.3.
Drupal core is not affected. If you do not use the contributed Alfresco module,
there is nothing you need to do.
Solution
Install the latest version:
- If you use the Alfresco module for Drupal 6.x, upgrade to Alfresco 6.x-1.3
Also see the Alfresco project page.
Reported by
- Pere Orga provisional member of the Drupal Security Team
Fixed by
- Sergio Martín Morillas the module maintainer
Coordinated by
- Pere Orga provisional member of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
CTB-Locker: Multilingual Malware Demands Ransom
Starting a few days ago, we began receiving multiple reports of malware-spreading campaigns in various countries mostly in Latin America and Eastern Europe.
The post CTB-Locker: Multilingual Malware Demands Ransom appeared first on We Live Security.
Hard-Coded FTP Credentials Found in Schneider Electric SCADA Gateway
Two flaws in Schneider Electric’s ETG3000 FactoryCast HMI Gateway allow unauthenticated remote access to the device’s FTP server and configuration file.
OS X 10.9.5 IOKit IntelAccelerator NULL Pointer Dereference
OS X 10.9.5 IOKit IntelAccelerator suffers from a null pointer dereference vulnerability. This is the proof of concept exploit released by Google.
Oracle Patches Backdoor Vulnerability, Recommends Disabling SSL
Oracle’s January 2015 Critical Patch update includes a fix for a backdoor found in the Oracle E-Business Suite by researcher David Litchfield. The patch is among 169 released in the CPU.
OS X 10.10 IOKit IntelAccelerator NULL Pointer Dereference
OS X 10.10 IOKit IntelAccelerator suffers from a null pointer dereference vulnerability. This is the proof of concept exploit released by Google.
[RT-SA-2014-010] AVM FRITZ!Box Firmware Signature Bypass
Posted by RedTeam Pentesting GmbH on Jan 21
Advisory: AVM FRITZ!Box: Firmware Signature Bypass
The signature check of FRITZ!Box firmware images is flawed. Malicious
code can be injected into firmware images without breaking the RSA
signature. The code will be executed either if a manipulated firmware
image is uploaded by the victim or if the victim confirms an update on
the webinterface during a MITM attack.
Details
=======
Product: AVM FRITZ!Box 7490, 7390, 7270v3 and other models…
Le Monde’s Twitter account hacked to say “Je ne suis pas Charlieâ€
The Syrian Electronic Army strikes again. Are you using two-factor authentication? You should be.
The post Le Monde’s Twitter account hacked to say “Je ne suis pas Charlie” appeared first on We Live Security.