Kaspersky Lab has extended its long-standing collaboration with NetApp in offering complimentary solutions for data centers with the announcement that Kaspersky Security for Storage is now compatible with NetApp ONTAP 9.
Monthly Archives: February 2017
Critical WordPress REST API Bug: Prevent Your Blog From Being Hacked!
Last week, WordPress patched three security flaws, but just yesterday the company disclosed about a nasty then-secret zero-day vulnerability that let remote unauthorized hackers modify the content of any post or page within a WordPress site.
The nasty bug resides in WordPress REST API that would lead to the creation of two new vulnerabilities: Remote privilege escalation and Content injection
![]()
thunderbird-45.7.0-1.fc25
For changes see: https://www.mozilla.org/en-US/thunderbird/45.7.0/releasenotes/
thunderbird-45.7.0-1.fc24
For changes see: https://www.mozilla.org/en-US/thunderbird/45.7.0/releasenotes/
Microsoft Windows SMB2 Tree Connect Response Stack Overflow (CVE-2017-0016)
A stack overflow vulnerability exists in Microsoft Windows. The vulnerability is due lack of sanity over Tree Connect response messages. Successful exploitation of this issue may allow attackers to execute arbitrary code.
WordPress REST API Content Injection
A content injection vulnerability exists in WordPress REST API. A remote attacker may exploit this vulnerability by sending a malicious request to the server. Successful exploitation would allow an attacker to inject and change content.
CVE-2017-5219
An issue was discovered in SageCRM 7.x before 7.3 SP3. The Component Manager functionality, provided by SageCRM, permits additional components to be added to the application to enhance provided functionality. This functionality allows a zip file to be uploaded, containing a valid .ecf component file, which will be extracted to the inf directory outside of the webroot. By creating a zip file containing an empty .ecf file, to pass file-validation checks, any other file provided in zip file will be extracted onto the filesystem. In this case, a web shell with the filename ‘..WWWRootCustomPagesaspshell.asp’ was included within the zip file that, when extracted, traversed back out of the inf directory and into the SageCRM webroot. This permitted remote interaction with the underlying filesystem with the highest privilege level, SYSTEM.
CVE-2017-5218
A SQL Injection issue was discovered in SageCRM 7.x before 7.3 SP3. The AP_DocumentUI.asp web resource includes Utilityfuncs.js when the file is opened or viewed. This file crafts a SQL statement to identify the database that is to be in use with the current user’s session. The database variable can be populated from the URL, and when supplied non-expected characters, can be manipulated to obtain access to the underlying database. The /CRM/CustomPages/ACCPAC/AP_DocumentUI.asp?SID=&database=1′;WAITFOR DELAY ‘0:0:5’– URI is a Proof of Concept.
Linux Multi/Dual Mode Reverse Shell Shellcode
129 bytes small Linux multi/dual mode reverse shell shellcode.
