MSA-23-0010: CSRF risk in resetting all templates of a database activity

by Michael Hawkins. The link to reset all templates of a database activity did not include the necessary token to prevent a CSRF risk.Severity/Risk:MinorVersions affected:4.1 to 4.1.1Versions fixed:4.1.2Reported by:DegrangeMCVE identifier:CVE-2023-28335Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77008Tracker issue:MDL-77008 CSRF risk in resetting all templates of a database activity More info: https://moodle.org/mod/forum/discuss.php?d=445067&parent=1788900

MSA-23-0012: Course participation report shows roles the user should not see

by Michael Hawkins. The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.Severity/Risk:MinorVersions affected:4.1 to 4.1.1, 4.0 to 4.0.6, 3.11 to 3.11.12, 3.9 to 3.9.19 and earlier unsupported versionsVersions fixed:4.1.2, 4.0.7, 3.11.13 and 3.9.20Reported by:Chris PrattCVE identifier:CVE-2023-1402Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75517Tracker More info: https://moodle.org/mod/forum/discuss.php?d=445069&parent=1788902

VMware and Pwn2Own Vancouver 2023

Greetings from VMware Security Response Center!! We’re excited to announce that VMware will be returning to Pwn2Own 2023 hosted on March 22nd – 24th, in Vancouver, Canada. VMware will have the opportunity to attend in-person to validate any demonstrations of a VMescape. Similar to last year, we will have two of our Hypervisors, VMware ESXi … ContinuedThe post VMware and Pwn2Own Vancouver 2023 appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2023/03/vmware-and-pwn2own-vancouver-2023.html?utm_source=rss&utm_medium=rss&utm_campaign=vmware-and-pwn2own-vancouver-2023

Unveiling the Evolution of Royal Ransomware

While the evolution of ransomware techniques is to be expected, the speed at which the Royal Ransomware Group has been able to adapt is impressive. Since it was first reported, those responsible for Royal ransomware have advanced quickly over a short period of time, leveraging old and new techniques as well as exploiting novel vulnerabilities … ContinuedThe post Unveiling the Evolution of Royal Ransomware appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2023/03/unveiling-the-evolution-of-royal-ransomware.html?utm_source=rss&utm_medium=rss&utm_campaign=unveiling-the-evolution-of-royal-ransomware

Drupal core – Moderately critical – Information Disclosure – SA-CORE-2023-002

Project: Drupal coreDate: 2023-March-15Security risk: Moderately critical 14∕25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Information DisclosureAffected versions: >=8.0.0 =9.5.0 =10.0.0 Description: The Media module does not properly check entity access in some circumstances. This may result in users seeing thumbnails of media items they do not have access to, including for private files.This release was coordinated with SA-CONTRIB-2023-010.This advisory is More info: https://www.drupal.org/sa-core-2023-002

Drupal core – Moderately critical – Information Disclosure – SA-CORE-2023-003

Project: Drupal coreDate: 2023-March-15Security risk: Moderately critical 13∕25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:UncommonVulnerability: Information DisclosureAffected versions: >=8.0.0 =9.5.0 =10.0.0 Description: The language module provides a Language switcher block which can be placed to provide links to quickly switch between different languages.The URL of unpublished translations may be disclosed. When used in conjunction with a module like Pathauto, this may reveal More info: https://www.drupal.org/sa-core-2023-003

Drupal core – Moderately critical – Access bypass – SA-CORE-2023-004

Project: Drupal coreDate: 2023-March-15Security risk: Moderately critical 14∕25 AC:Complex/A:Admin/CI:All/II:All/E:Theoretical/TD:UncommonVulnerability: Access bypassAffected versions: =8.0.0 =9.5.0 =10.0.0 Description: Drupal core provides a page that outputs the markup from phpinfo() to assist with diagnosing PHP configuration.If an attacker was able to achieve an XSS exploit against a privileged user, they may be able to use the phpinfo page to access sensitive information that could More info: https://www.drupal.org/sa-core-2023-004

Why CISOs Should Prioritize Extended Detection & Response (XDR)

In my role as General Manager of the VMware Security Business Unit, I have the privilege of speaking regularly with many Chief Information Security Officers (CISOs) around the globe. While some face challenges unique to the specific organization over which they provide cyber stewardship, I have commonly heard three strategic imperatives shared during these conversations. … ContinuedThe post Why CISOs Should Prioritize Extended Detection & Response (XDR) appeared first on VMware More info: https://blogs.vmware.com/security/2023/03/why-cisos-should-prioritize-extended-detection-response-xdr.html?utm_source=rss&utm_medium=rss&utm_campaign=why-cisos-should-prioritize-extended-detection-response-xdr

Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow a remote attacker to bypass authentication or execute arbitrary commands on the underlying operating system of an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has not released software updates to address the vulnerabilities described in this advisory. There are no More info: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Small%20Business%20RV016,%20RV042,%20RV042G,%20RV082,%20RV320,%20and%20RV325%20Routers%20Vulnerabilities&vs_k=1

Cisco IP Phone 6800, 7800, and 8800 Series Web UI Vulnerabilities

Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following More info: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-cmd-inj-KMFynVcP?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20IP%20Phone%206800,%207800,%20and%208800%20Series%20Web%20UI%20Vulnerabilities&vs_k=1
Translate »