Tag
#redis
Backdoor.Win32.Amatu.a malware suffers from a remote arbitrary file write vulnerability.
Backdoor.Win32.Agent.pw malware suffers from a buffer overflow vulnerability.
Backdoor.Win32.Boiling malware suffers from a code execution vulnerability.
Red Hat Security Advisory 2024-7103-03 - An update for grafana-pcp is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.
Red Hat Security Advisory 2024-6765-03 - An update is now available for Red Hat Ansible Automation Platform 2.4.
Backdoor.Win32.CCInvader.10 malware suffers from a bypass vulnerability.
Backdoor.Win32.BlackAngel.13 malware suffers from a code execution vulnerability.
Backdoor.Win32.Delf.yj malware suffers from an information leakage vulnerability.
### Summary Unauthenticated user can access credentials of last authenticated user via OpenID or OAuth2 where the authentication URL did not include `redirect` query string. For example: - Project is configured with OpenID or OAuth2 - Project is configured with cache enabled - User tries to login via SSO link, but without `redirect` query string - After successful login, credentials are cached - If an unauthenticated user tries to login via SSO link, it will return the credentials of the other last user The SSO link is something like `https://directus.example.com/auth/login/openid/callback`, where `openid` is the name of the OpenID provider configured in Directus ### Details This happens because on that endpoint for both OpenId and Oauth2 Directus is using the `respond` middleware, which by default will try to cache GET requests that met some conditions. Although, those conditions do not include this scenario, when an unauthenticated request returns user credentials. For OpenID, thi...
Backdoor.Win32.Symmi.qua malware suffers from a buffer overflow vulnerability.