K31833420: Multiple Oracle Java SE vulnerabilities

Multiple Oracle Java SE vulnerabilities Security Advisory Security Advisory Description CVE-2022-21305 Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java ... More info: https://support.f5.com/csp/article/K31833420?utm_source=f5support&utm_medium=RSS

Setting the Record Straight on XDR at VMware Explore Europe

There seems to be a bit of confusion as to what constitutes XDR (extended detection and response). To clear up the conversation, we held a session at VMware Explore Europe to address what it is and how it is used to address current security vulnerabilities. This session was helmed by VMware VP of Security Services, … ContinuedThe post Setting the Record Straight on XDR at VMware Explore Europe appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2022/11/setting-the-record-straight-on-xdr-at-vmware-explore-europe.html?utm_source=rss&utm_medium=rss&utm_campaign=setting-the-record-straight-on-xdr-at-vmware-explore-europe

K82567234: NodeJS vulnerability CVE-2022-32215

NodeJS vulnerability CVE-2022-32215 Security Advisory Security Advisory Description The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle ... More info: https://support.f5.com/csp/article/K82567234?utm_source=f5support&utm_medium=RSS

Threat Analysis: Active C2 Discovery Using Protocol Emulation Part4 (Dacls, aka MATA)

Dacls, aka MATA, is a cross-platform RAT used by the DPRK-linked Lazarus Group and the first artifacts were observed around April 2018. The VMware Threat Analysis Unit (TAU) first discovered the Dacls C2 servers on the Internet by protocol emulation in August 2020. TAU is providing details here on how to detect the C2 servers … ContinuedThe post Threat Analysis: Active C2 Discovery Using Protocol Emulation Part4 (Dacls, aka MATA) appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2022/11/threat-analysis-active-c2-discovery-using-protocol-emulation-part4-dacls-aka-mata.html?utm_source=rss&utm_medium=rss&utm_campaign=threat-analysis-active-c2-discovery-using-protocol-emulation-part4-dacls-aka-mata

MSA-22-0028: Apply upstream security fix to VideoJS library to remove XSS risk

by Michael Hawkins. An upstream security patch was applied to the third party VideoJS library included with Moodle, on versions affected by an XSS risk.Severity/Risk:SeriousVersions affected:3.11 to 3.11.10, 3.9 to 3.9.17 and earlier unsupported versionsVersions fixed:3.11.11 and 3.9.18Reported by:VincentCVE identifier:CVE-2021-23414 (upstream)Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75278Tracker issue:MDL-75278 Apply upstream More info: https://moodle.org/mod/forum/discuss.php?d=440767&parent=1773535

MSA-22-0029: Course restore – CSRF token passed in course redirect URL

by Michael Hawkins. A users CSRF token was unnecessarily included in the URL when being redirected to a course they have just restored.Severity/Risk:MinorVersions affected:4.0 to 4.0.4, 3.11 to 3.11.10, 3.9 to 3.9.17 and earlier unsupported versionsVersions fixed:4.0.5, 3.11.11 and 3.9.18Reported by:Michael HawkinsCVE identifier:CVE-2022-45149Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75862Tracker issue:MDL-75862 Course restore - CSRF More info: https://moodle.org/mod/forum/discuss.php?d=440769&parent=1773537

MSA-22-0030: Reflected XSS risk in policy tool

by Michael Hawkins. The return URL in the policy tool required extra sanitizing to prevent a reflected XSS risk.Severity/Risk:SeriousVersions affected:4.0 to 4.0.4, 3.11 to 3.11.10, 3.9 to 3.9.17 and earlier unsupported versionsVersions fixed:4.0.5, 3.11.11 and 3.9.18Reported by:Eric MerrillCVE identifier:CVE-2022-45150Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76091Tracker issue:MDL-76091 Reflected XSS risk in policy tool More info: https://moodle.org/mod/forum/discuss.php?d=440770&parent=1773538

MSA-22-0031: Stored XSS possible in some &quot;social&quot; user profile fields

by Michael Hawkins. The "social" user profile field type performed insufficient escaping on some fields, resulting in a stored XSS risk.Severity/Risk:SeriousVersions affected:4.0 to 4.0.4 and 3.11 to 3.11.10Versions fixed:4.0.5 and 3.11.11Reported by:Bernardo CabralWorkaround:Update "social" user profile fields so their visibility is set to "not visible", until the patch is applied.CVE identifier:CVE-2022-45151Changes More info: https://moodle.org/mod/forum/discuss.php?d=440771&parent=1773539

MSA-22-0032: Blind SSRF risk in LTI provider library

by Michael Hawkins. Moodles LTI provider library did not utilise Moodles inbuilt cURL helper, which resulted in a blind SSRF risk.Severity/Risk:SeriousVersions affected:4.0 to 4.0.4, 3.11 to 3.11.10, 3.9 to 3.9.17 and earlier unsupported versionsVersions fixed:4.0.5, 3.11.11 and 3.9.18Reported by:Rekter0 and HolmeCVE identifier:CVE-2022-45152Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71920Tracker issue:MDL-71920 Blind SSRF risk in LTI More info: https://moodle.org/mod/forum/discuss.php?d=440772&parent=1773540

K91021753: Apache MINA vulnerability CVE-2022-45047

Apache MINA vulnerability CVE-2022-45047 Security Advisory Security Advisory Description Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses ... More info: https://support.f5.com/csp/article/K91021753?utm_source=f5support&utm_medium=RSS
Translate »