Security
Headlines
HeadlinesLatestCVEs

Tag

#redis

CVE-2022-39263: Missing token verification in Upstash Adapter

`@next-auth/upstash-redis-adapter` is the Upstash Redis adapter for NextAuth.js, which provides authentication for Next.js. Applications that use `next-auth` Email Provider and `@next-auth/upstash-redis-adapter` before v3.0.2 are affected by this vulnerability. The Upstash Redis adapter implementation did not check for both the identifier (email) and the token, but only checking for the identifier when verifying the token in the email callback flow. An attacker who knows about the victim's email could easily sign in as the victim, given the attacker also knows about the verification token's expired duration. The vulnerability is patched in v3.0.2. A workaround is available. Using Advanced Initialization, developers can check the requests and compare the query's token and identifier before proceeding.

CVE
#vulnerability#redis#nodejs#js#auth
Backdoor.Win32.Augudor.b MVID-2022-0644 Code Execution

Backdoor.Win32.Augudor.b malware suffers from a code execution vulnerability.

Backdoor.Win32.Psychward.b MVID-2022-0645 Hardcoded Credential

Backdoor.Win32.Psychward.b malware suffers from a hardcoded credential vulnerability.

CVE-2022-35951: Heap overflow in Redis 7.0 XAUTOCLAIM command's COUNT argument.

Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist.

Over 39,000 Unauthenticated Redis Instances Found Exposed on the Internet

An unknown attacker targeted tens of thousands of unauthenticated Redis servers exposed on the internet in an attempt to install a cryptocurrency miner. It's not immediately known if all of these hosts were successfully compromised. Nonetheless, it was made possible by means of a "lesser-known technique" designed to trick the servers into writing data to arbitrary files – a case of unauthorized

CVE-2022-37884

A vulnerability exists in the ClearPass Policy Manager Guest User Interface that can allow an unauthenticated attacker to send specific operations which result in a Denial-of-Service condition. A successful exploitation of this vulnerability results in the unavailability of the guest interface in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address this security vulnerability.

Backdoor.Win32.Hellza.120 MVID-2022-0641 Remote Command Execution

Backdoor.Win32.Hellza.120 malware suffers from a remote command execution vulnerability.

Backdoor.Win32.Hellza.120 MVID-2022-0642 Authentication Bypass

Backdoor.Win32.Hellza.120 malware suffers from an authentication bypass vulnerability.

Trojan.Ransom.Ryuk.A MVID-2022-0640 Code Execution

Trojan.Ransom.Ryuk.A ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL, execute our own code, and control and terminate the malware pre-encryption. Once loaded the exploit dll will check if the current directory is "C:\Windows\System32" and if not, we grab our process ID and terminate. All basic tests were conducted successfully in a virtual machine environment.