A new vulnerability in an open-source software component, polkit, emerged this week, to a lot of publicity (in which it has been named “PwnKit”). This vulnerability is present in Linux distributions going back more than a decade, so the scope is broad. With Log4j issues still fresh in our minds there have been questions about The post CVE-2021-4034, polkit, and VMware appeared first on VMware Security Blog.
More info:
https://blogs.vmware.com/security/2022/01/cve-2021-4034-polkit-pwnkit-vmware-products.html?utm_source=rss&utm_medium=rss&utm_campaign=cve-2021-4034-polkit-pwnkit-vmware-products
Polkit pkexec vulnerability CVE-2021-4034 Security Advisory Security Advisory Description A local privilege escalation vulnerability was found on polkits pkexec utility. The pkexec application is ...
More info:
https://support.f5.com/csp/article/K46015513?utm_source=f5support&utm_medium=RSS
NSS vulnerability CVE-2021-43527 Security Advisory Security Advisory Description NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when ...
More info:
https://support.f5.com/csp/article/K54450124?utm_source=f5support&utm_medium=RSS
This article was authored by Pavankumar Chaudhari (TAU) Summary Recently, the VMware Threat Analysis Unit analyzed BlackSun ransomware, a PowerShell-based ransomware. Unlike most other PowerShell-based ransomware it doesn’t download a payload or reflectively load a DLL or EXE into memory. Looking at the simplicity of code it is unclear if it is used for limited The post BlackSun Ransomware – The Dark Side of PowerShell appeared first on VMware Security Blog.
More info:
https://blogs.vmware.com/security/2022/01/blacksun-ransomware-the-dark-side-of-powershell.html?utm_source=rss&utm_medium=rss&utm_campaign=blacksun-ransomware-the-dark-side-of-powershell
by Michael Hawkins. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.Severity/Risk:SeriousVersions affected:3.11 to 3.11.4Versions fixed:3.11.5Reported by:Paul HoldenCVE identifier:CVE-2022-0332Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72573Tracker issue:MDL-72573 SQL injection risk in code fetching h5p activity user attempts
More info:
https://moodle.org/mod/forum/discuss.php?d=431099&parent=1734813
by Michael Hawkins. The calendar:manageentries capability allowed managers to access or modify any calendar event, but should have been restricted from accessing user level events.Severity/Risk:MinorVersions affected:3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versionsVersions fixed:3.11.5, 3.10.9 and 3.9.12Reported by:oct0pus7CVE identifier:CVE-2022-0333Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71239Tracker
More info:
https://moodle.org/mod/forum/discuss.php?d=431100&parent=1734814
by Michael Hawkins. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability.Severity/Risk:MinorVersions affected:3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versionsVersions fixed:3.11.5, 3.10.9 and 3.9.12Reported by:Deds CastilloCVE identifier:CVE-2022-0334Changes
More info:
https://moodle.org/mod/forum/discuss.php?d=431102&parent=1734816
by Michael Hawkins. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk.Severity/Risk:SeriousVersions affected:3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versionsVersions fixed:3.11.5, 3.10.9 and 3.9.12Reported by:OstapbenderCVE identifier:CVE-2022-0335Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72367Tracker issue:MDL-72367 CSRF risk in badge
More info:
https://moodle.org/mod/forum/discuss.php?d=431103&parent=1734817
Project: Drupal coreDate: 2022-January-19Security risk: Moderately critical 14∕25 AC:Basic/A:User/CI:Some/II:Some/E:Proof/TD:DefaultVulnerability: Cross site scriptingDescription: jQuery UI is a third-party library used by Drupal. This library was previously thought to be end-of-life.Late in 2021, jQuery UI announced that they would be continuing development, and released a jQuery UI 1.13.0 version. In addition to the issue covered by SA-CORE-2022-001, further security vulnerabilities
More info:
https://www.drupal.org/sa-core-2022-002
BIG-IP VE vulnerability CVE-2022-23030 Security Advisory Security Advisory Description When the BIG-IP Virtual Edition (VE) uses the ixlv driver (which is used in SR-IOV mode and requires Intel ...
More info:
https://support.f5.com/csp/article/K53442005?utm_source=f5support&utm_medium=RSS