Reflected Cross-Site Scripting vulnerability in W3 Total Cache plugin

Posted by Summer of Pwnage on Nov 10

————————————————————————
Reflected Cross-Site Scripting vulnerability in W3 Total Cache plugin
————————————————————————
Sipke Mellema, July 2016

————————————————————————
Abstract
————————————————————————
A Cross-Site Scripting vulnerability was found in the…

Information disclosure race condition in W3 Total Cache WordPress Plugin

Posted by Summer of Pwnage on Nov 10

————————————————————————
Information disclosure race condition in W3 Total Cache WordPress Plugin
————————————————————————
Sipke Mellema, July 2016

————————————————————————
Abstract
————————————————————————
An information disclosure vulnerability was found…

Persistent Cross-Site Scripting in WP Google Maps Plugin via CSRF

Posted by Summer of Pwnage on Nov 10

————————————————————————
Persistent Cross-Site Scripting in WP Google Maps Plugin via CSRF
————————————————————————
Sipke Mellema, July 2016

————————————————————————
Abstract
————————————————————————
A persistent Cross-Site Scripting vulnerability was found…

Weak validation of Amazon SNS push messages in W3 Total Cache WordPress Plugin

Posted by Summer of Pwnage on Nov 10

————————————————————————
Weak validation of Amazon SNS push messages in W3 Total Cache WordPress
Plugin
————————————————————————
Sipke Mellema, July 2016

————————————————————————
Abstract
————————————————————————
A vulnerability in the validation of Amazon…

OpenSSL Releases Security Update

Original release date: November 10, 2016

OpenSSL version 1.1.0c has been released to address vulnerabilities in prior versions. Exploitation of some of these vulnerabilities may allow a remote attacker to cause a denial-of-service condition.

Users and administrators are encouraged to review the OpenSSL Security Advisory and apply the necessary update.


This product is provided subject to this Notification and this Privacy & Use policy.

OpenSSL Releases Patch For "High" Severity Vulnerability

As announced on Tuesday, the OpenSSL project team released OpenSSL version 1.1.0c that addresses three security vulnerabilities in its software.

The most serious of all is a heap-based buffer overflow bug (CVE-2016-7054) related to Transport Layer Security (TLS) connections using *-CHACHA20-POLY1305 cipher suites.

The vulnerability, reported by Robert Święcki of the Google Security Team on

CVE-2016-7146

MoinMoin 1.9.8 allows remote attackers to conduct “JavaScript injection” attacks by using the “page creation or crafted URL” approach, related to a “Cross Site Scripting (XSS)” issue affecting the action=fckdialog&dialog=attachment (via page name) component.

CVE-2016-7148

MoinMoin 1.9.8 allows remote attackers to conduct “JavaScript injection” attacks by using the “page creation” approach, related to a “Cross Site Scripting (XSS)” issue affecting the action=AttachFile (via page name) component.

firewalld-0.4.4.1-1.fc23

**Support Recognition of Automatic Helper Assignment Setting**

Automatic helper assignment has been disabled in kernel 4.7. firewalld version 0.4.4 is now able to recognize this and to create rules if automatic helper assignment has been turned off to make conntrack helpers work again. If automatic helper assignment is turned on, then firewalld will behave as before.

For more information about the use of netfilter conntrack helper, please have a look at http://www.firewalld.org/2016/10/automatic-helper-assignment

**Firewall-applet is now using Qt5**

The firewall applet has been ported from Qt4 to Qt5.

**Fixes LogDenied for zone reject targets**

The logging rules for LogDenied have been placed after the reject rules for zones using the reject targets. The logging rules are now placed before these reject rules to fix logging.

**Does not abort transaction on failed ipv6_rpfilter rules**

The existing transaction will be executed before trying to add the rules for ipv6_rpfilter and a new transaction will be used to apply the ipv6_rpfiler rules. If this transaction fails, a warning is printed out and the remaining rules are applied with the next transaction.

**Enhancements for the command line tools**

The command line tools are now more consistent with errors and error codes in sequence options. The NOT_AUTHORIZED error is now also working.

**New services**

The services cfengine, condor-collector and smtp-submission have been added.

**firewall-config: Use proper source check in sourceDialog (issue #162)**

**firewallctl: Use sys.excepthook to force exception_handler usage always**

**firewallctl: Support helpers**

**Several other enhancements and fixes**

—-

– Fix CVE-2016-5410: Firewall configuration can be modified by any logged in user
– firewall/server/firewalld: Make getXSettings and getLogDenied CONFIG_INFO
– Update AppData configuration file.
– tests/firewalld_rich.py: Use new import structure and FirewallClient classes
– tests/firewalld_direct.py: Use new import structure
– tests: firewalld_direct: Fix assert to check for True instead of False
– tests: firewalld_config: Fix expected value when querying the zone target
– tests: firewalld_config: Use real nf_conntrack modules
– firewalld.spec: Added comment about make call for %build
– firewall-config: Use also width_request and height_request with default size
– Updated firewall-config screenshot
– firewall-cmd: Fixed typo in help output (RHBZ#1367171)
– test-suite: Ignore stderr to get default zone also for missing firewalld.conf
– firewall.core.logger: Warnings should be printed to stderr per default
– firewall.core.fw_nm: Ignore NetworkManager if NM.Client connect fails
– firewall-cmd, firewallctl: Gracefully fail if SystemBus can not be aquired
– firewall.client: Generate new DBUS_ERROR if SystemBus can not be aquired
– test-suite: Do not fail on ALREADY_ENABLED –add-destination tests
– firewall.command: ALREADY_ENABLED, NOT_ENABLED, ZONE_ALREADY_SET are warnings
– doc/xml/firewalld.dbus.xml: Removed undefined reference
– doc/xml/transform-html.xsl.in: Fixed references in the document
– doc/xml/firewalld.{dbus,zone}.xml: Embed programlisting in para
– doc/xml/transform-html.xsl.in: Enhanced html formatting closer to the man page
– firewall: core: fw_nm: Instantiate the NM client only once
– firewall/core/io/*.py: Do not traceback on a general sax parsing issue
– firewall-offline-cmd: Fix –{add,remove}-entries-from-file
– firewall-cmd: Add missing action to fix –{add,remove}-entries-from-file
– firewall.core.prog: Do not output stderr, but return it in the error case
– firewall.core.io.ifcfg.py: Fix ifcfg file reader and writer (RHBZ#1362171)
– config/firewall.service.in: use KillMode=mixed
– config/firewalld.service.in: use network-pre.target
– firewall-config: Add missing gettext.textdomain call to fix translations
– Add UDP to transmission-client.xml service
– tests/firewall-[offline-]cmd_test.sh: Hide errors and warnings
– firewall.client: Fix ALREADY_ENABLED errors in icmptype destination calls
– firewall.client: Fix NOT_ENABLED errors in icmptype destination calls
– firewall.client: Use {ALREADY,NOT}_ENABLED errors in icmptype destination
calls
– firewall.command: Add the removed FirewallError handling to the action
(a17ce50)
– firewall.command: Do not use query methods for sequences and also single
options
– Add missing information about MAC and ipset sources to man pages and help
output
– firewalld.spec: Add BuildRequires for libxslt to enable rebuild of man pages
– firewall[-offline]-cmd, firewallctl, firewall.command: Use sys.{stdout,stderr}
– firewallctl: Fix traceback if not connected to firewalld
– firewall-config: Initialize value in on_richRuleDialogElementChooser_clicked
– firewall.command: Convert errors to string for Python3
– firewall.command: Get proper firewall error code from D-BusExceptions
– firewall-cmd: Fixed traceback without args
– Add missing service files to Makefile.am
– shell-completion: Add shell completion support for
–{get,set}–{description,short}

CVE-2016-4095

Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.