Mod_auth_openidc.c in the Ping Identity OpenID Connect authentication module for Apache (aka mod_auth_openidc) before 2.14 allows remote attackers to spoof page content via a malicious URL provided to the user, which triggers an invalid request.
backintime-1.1.20-1.fc24
– update to 1.1.20
– fixes CVE-2017-7572
backintime-1.1.20-1.fc25
– update to 1.1.20
– fixes CVE-2017-7572
backintime-1.1.20-1.fc26
– update to 1.1.20
– fixes CVE-2017-7572
XiongMai uc-http 1.0.0 Local File Inclusion / Directory Traversal
uc-httpd is an HTTP daemon used by a wide array of IoT devices and is vulnerable to local file inclusion and directory traversal bugs.
Phone Hack Uses Sensors To Steal PINs
University researchers created a browser-based JavaScript that leverages a phone’s smart device sensor data to steal PINs.
CVE-2016-8716
An exploitable Cleartext Transmission of Password vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. The Change Password functionality of the Web Application transmits the password in cleartext. An attacker capable of intercepting this traffic is able to obtain valid credentials.
CVE-2016-8718
An exploitable Cross-Site Request Forgery vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted form can trick a client into making an unintentional request to the web server which will be treated as an authentic request.
CVE-2016-8719
An exploitable reflected Cross-Site Scripting vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. Specially crafted input, in multiple parameters, can cause a malicious scripts to be executed by a victim.
Media – Critical – 1.x branch unsupported – SA-CONTRIB-2017-042
- Advisory ID: DRUPAL-SA-CONTRIB-2017-042
- Project: Media (third-party module)
- Date: 12-Apr-2017
Description
The Media module provides an extensible framework for managing files and multimedia assets, regardless of whether they are hosted on your own site or a 3rd party site – it is commonly referred to as a ‘file browser to the internet’.
Versions affected
- Only the 1.x branch is affected. Version 2.0 does not have this vulnerability.
Drupal core is not affected. If you do not use the contributed Media module, there is nothing you need to do.
Solution
If you use the Media 1.x branch you should upgrade to version 2.0 or later.
See the Media 2.0 release notes for more information on how to upgrade (it’s more complex than most contrib upgrades – for example, it involves other contrib modules moving from media_entity to file_entity)!
Also see the Media project page.
Reported by
- Fabricio Bedoya
- Almc
- Lee Rowlands
- Andrew Berry
- Matt Glaman
- Pieter Frenssen
- Andy Tawse
- Chi
- Damian Robinson
Fixed by
Not applicable
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity