CVE-2021-4034, polkit, and VMware

A new vulnerability in an open-source software component, polkit, emerged this week, to a lot of publicity (in which it has been named “PwnKit”). This vulnerability is present in Linux distributions going back more than a decade, so the scope is broad. With Log4j issues still fresh in our minds there have been questions about The post CVE-2021-4034, polkit, and VMware appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2022/01/cve-2021-4034-polkit-pwnkit-vmware-products.html?utm_source=rss&utm_medium=rss&utm_campaign=cve-2021-4034-polkit-pwnkit-vmware-products

K46015513: Polkit pkexec vulnerability CVE-2021-4034

Polkit pkexec vulnerability CVE-2021-4034 Security Advisory Security Advisory Description A local privilege escalation vulnerability was found on polkits pkexec utility. The pkexec application is ... More info: https://support.f5.com/csp/article/K46015513?utm_source=f5support&utm_medium=RSS

K54450124: NSS vulnerability CVE-2021-43527

NSS vulnerability CVE-2021-43527 Security Advisory Security Advisory Description NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when ... More info: https://support.f5.com/csp/article/K54450124?utm_source=f5support&utm_medium=RSS

BlackSun Ransomware – The Dark Side of PowerShell

This article was authored by Pavankumar Chaudhari (TAU) Summary Recently, the VMware Threat Analysis Unit analyzed BlackSun ransomware, a PowerShell-based ransomware. Unlike most other PowerShell-based ransomware it doesn’t download a payload or reflectively load a DLL or EXE into memory. Looking at the simplicity of code it is unclear if it is used for limited The post BlackSun Ransomware – The Dark Side of PowerShell appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2022/01/blacksun-ransomware-the-dark-side-of-powershell.html?utm_source=rss&utm_medium=rss&utm_campaign=blacksun-ransomware-the-dark-side-of-powershell

MSA-22-0001: SQL injection risk in code fetching h5p activity user attempts

by Michael Hawkins. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.Severity/Risk:SeriousVersions affected:3.11 to 3.11.4Versions fixed:3.11.5Reported by:Paul HoldenCVE identifier:CVE-2022-0332Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72573Tracker issue:MDL-72573 SQL injection risk in code fetching h5p activity user attempts More info: https://moodle.org/mod/forum/discuss.php?d=431099&parent=1734813

MSA-22-0002: calendar:manageentries capability allows CRUD access to all calendar events

by Michael Hawkins. The calendar:manageentries capability allowed managers to access or modify any calendar event, but should have been restricted from accessing user level events.Severity/Risk:MinorVersions affected:3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versionsVersions fixed:3.11.5, 3.10.9 and 3.9.12Reported by:oct0pus7CVE identifier:CVE-2022-0333Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71239Tracker More info: https://moodle.org/mod/forum/discuss.php?d=431100&parent=1734814

MSA-22-0003: Capability gradereport/user:view not always respected when navigating to a users course grade report

by Michael Hawkins. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability.Severity/Risk:MinorVersions affected:3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versionsVersions fixed:3.11.5, 3.10.9 and 3.9.12Reported by:Deds CastilloCVE identifier:CVE-2022-0334Changes More info: https://moodle.org/mod/forum/discuss.php?d=431102&parent=1734816

MSA-22-0004: CSRF risk in badge alignment deletion

by Michael Hawkins. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk.Severity/Risk:SeriousVersions affected:3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versionsVersions fixed:3.11.5, 3.10.9 and 3.9.12Reported by:OstapbenderCVE identifier:CVE-2022-0335Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72367Tracker issue:MDL-72367 CSRF risk in badge More info: https://moodle.org/mod/forum/discuss.php?d=431103&parent=1734817

Drupal core – Moderately critical – Cross site scripting – SA-CORE-2022-002

Project: Drupal coreDate: 2022-January-19Security risk: Moderately critical 14∕25 AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:DefaultVulnerability: Cross site scriptingDescription: jQuery UI is a third-party library used by Drupal. This library was previously thought to be end-of-life.Late in 2021, jQuery UI announced that they would be continuing development, and released a jQuery UI 1.13.0 version. In addition to the issue covered by SA-CORE-2022-001, further security vulnerabilities More info: https://www.drupal.org/sa-core-2022-002

K53442005: BIG-IP VE vulnerability CVE-2022-23030

BIG-IP VE vulnerability CVE-2022-23030 Security Advisory Security Advisory Description When the BIG-IP Virtual Edition (VE) uses the ixlv driver (which is used in SR-IOV mode and requires Intel ... More info: https://support.f5.com/csp/article/K53442005?utm_source=f5support&utm_medium=RSS
Translate »