CVE-2015-1582

Multiple cross-site scripting (XSS) vulnerabilities in the Spider Facebook plugin before 1.0.11 for WordPress allow (1) remote attackers to inject arbitrary web script or HTML via the appid parameter in a registration task to the default URI or remote administrators to inject arbitrary web script or HTML via the (2) asc_or_desc, (3) order_by, (4) page_number, (5) serch_or_not, or (6) search_events_by_title parameter in (a) the Spider_Facebook_manage page to wp-admin/admin.php or a (b) selectpagesforfacebook or (c) selectpostsforfacebook action to wp-admin/admin-ajax.php.

SA-CONTRIB-2015-045 – Node Access Product – Cross Site Scripting (XSS) – Unsupported

Description

The Node Access Product module provides ‘Node access’ settings for product nodes, whereby users who purchase the product are granted view access to content, which can be predefined either by taxonomy, by node, or by Views.

The module doesn’t sufficiently sanitize node titles leading to the possibility of cross-site scripting by an attacker.

This vulnerability is mitigated by the fact that an attacker must have a role with permission to create/edit content.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.

Versions affected

  • All versions of Node Access Product

Drupal core is not affected. If you do not use the contributed Node Access Product module, there is nothing you need to do.

Solution

If you use the Node Access Product module you should uninstall it.

Also see the Node access product project page.

Reported by

Fixed by

  • Not applicable.

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: 

SA-CONTRIB-2015-046 – Taxonomy Tools – Cross Site Scripting (XSS)

Description

Taxonomy Tools module provides alternative ways of managing taxonomy terms.

The module doesn’t sufficiently escape node and taxonomy term titles when displaying them, allowing a malicious user to inject code.

This vulnerability is mitigated by the fact that an attacker must have a role with permission to create or edit nodes or taxonomy terms.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance
    with Drupal Security Team processes.

Versions affected

  • Taxonomy Tools 7.x-1.x versions prior to 7.x-1.4.

Drupal core is not affected. If you do not use the contributed Taxonomy Tools module,
there is nothing you need to do.

Solution

Install the latest version:

Also see the Taxonomy Tools project page.

Reported by

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: 

AVG AntiVirus PRO is first security app to enter Google Play Revenue Chart

AVG’s position in the Top 10 chart is according to the App Annie Index for December 2014, produced by mobile app analytics company App Annie. The report, which analyzes trends and downloads for apps across all the major app stores, looks at both the popularity of apps and the revenue they drive.

In the report, App Annie details the incredible growth that they have tracked in security apps. And one year after climbing into the top ten apps for downloads, AVG AntiVirus PRO Android Security – referred to AntiVirus Security on Google Play – has become the first security app to enter the Top 10 Revenue Chart (excluding games) on the Google Play Store.

Top Revenue Apps on Google Play

 

Proven demand

Increased demand comes after a busy 2014 for cybersecurity events and suggests consumers are more security conscious as a result.

There is demand for security apps – the continued popularity of AVG AntiVirus Security FREE, which was the first security app to exceed 100m downloads on Google Play, shows this.  People, however, are not only protecting their devices with free security apps but are willing to invest in the solutions that they trust.

This is echoed in the recent MEF Global Consumer Trust Report where 64% of those studied use software or apps to guard passwords and protect against malware and only one in ten (11%) take no steps to protect their device.

 

Highly Rated

AppAnnie’s report also highlighted that AVG AntiVirus Security FREE is receiving overwhelmingly positive reviews from the public.

During December, AVG’s AntiVirus Security FREE received an average rating of 4.6 from over 33,000 reviews, with 77% of all users awarding us a maximum score of five stars.

AVG AntiVirus FREE Reviews

 

 

The future is bright

At AVG, we’re already looking ahead to a world where mobile devices are not just secured, but integrated across the Internet of Things. Through AVG Zen, we deliver a single dashboard from which a customer can manage the security, privacy and performance of all their devices and those of their family, all in one place.

 

Microsoft Group Policy Vulnerability Affects All Windows Computers

Details were released on two Microsoft Group Policy vulnerabilities affecting all Windows machines going back to Windows Server 2003. The flaws were addressed in separate Patch Tuesday security bulletins.

Why iOS devices could be one tap away from disaster

Users who don’t pay attention to warning messages on their iPhones or iPads run the risk of becoming infected with malware that can steal their personal information such as text messages, contact lists, pictures and even their location.

If you’ve followed our advice in the past for keeping your iOS device secure, you’ll know that you should be doing the following:

  • Install updates – keep up to date, and that includes your apps too.
  • Keep a backup – use iCloud or Dropbox for photos and backup your device.
  • Never “jailbreak” – this is the method for breaking the factory security.
  • Activate anti-theft – such as “Find my iPhone/iPad” to locate a lost or stolen device.

BUT despite this, did you know you could still be just one tap away from disaster?

As reported in Macworld, security researchers uncovered spyware dubbed “XAgent” that is delivered via a phishing attack and can spread to other iOS users via contacts in your address book.

For more tips on staying safe from phishing, check out my blog “How To Protect Yourself from Phishing Attacks”

The good news is that you can do something about this, as all the users affected by this particular threat (and previous ones using the same technique) almost certainly “infected themselves” by ignoring vital warning message prompts.

Apple advise iOS users here to be mindful to only download and install apps from the Apple App Store and to be cautious of so-called “enterprise apps” that are only intended for employees of large businesses.

Therefore, if you don’t work for a company that is specifically requesting you to install an app and you see these following prompts – make sure you answer them correctly to protect yourself from inadvertently installing malware.

iOS Install Warning

To protect yourself in this example you click CANCEL

 

iOS Trust Warning

 

To protect yourself in this example you click DON’T TRUST

You might have also seen a similar Trust or Don’t Trust option available when connecting your iPhone or iPad to a friends computer – and again the safer option is always Don’t Trust.

Until next time, stay safe out there.

Title image courtesy of iMore