Security
Headlines
HeadlinesLatestCVEs

Tag

#redis

Backdoor.Win32.Delf.eg MVID-2022-0647 Remote Command Execution

Backdoor.Win32.Delf.eg malware suffers from an unauthenticated remote command execution vulnerability.

Packet Storm
#vulnerability#web#redis#backdoor#auth
Backdoor.Win32.NTRC MVID-2022-0646 Hardcoded Credential

Backdoor.Win32.NTRC malware suffers from a hardcoded credential vulnerability.

CVE-2022-38817: Vulnerabilities exist for unauthorized access to sensitive information and application closure · Issue #222 · dapr/dashboard

Dapr Dashboard v0.1.0 through v0.10.0 is vulnerable to Incorrect Access Control that allows attackers to obtain sensitive data.

Magento 1 vs Magento 2

By Owais Sultan Over the last decade, a couple of aspects have changed within the tech world and Magento is no… This is a post from HackRead.com Read the original post: Magento 1 vs Magento 2

Gentoo Linux Security Advisory 202209-17

Gentoo Linux Security Advisory 202209-17 - Multiple vulnerabilities have been found in Redis, the worst of which could result in arbitrary code execution. Versions less than 7.0.5 are affected.

GHSA-4rxr-27mm-mxq9: Upstash Adapter missing token verification

### Impact Applications that use `next-auth` Email Provider and `@next-auth/upstash-redis-adapter` before v3.0.2 are affected. ### Description The Upstash Redis adapter implementation did not check for both the identifier (email) and the token, but only checking for the identifier when verifying the token in the email callback flow. An attacker who knows about the victim's email could easily sign in as the victim, given the attacker also knows about the verification token's expired duration. ### Patches The vulnerability is patched in v3.0.2. To upgrade, run one of the following: ``` npm i @next-auth/upstash-redis-adapter@latest ``` ``` yarn add @next-auth/upstash-redis-adapter@latest ``` ``` pnpm add @next-auth/upstash-redis-adapter@latest ``` ### Workarounds Using Advanced Initialization, developers can check the requests and compare the query's token and identifier before proceeding. Below is an example of how to do this: (Upgrading is still strongly recommended) ```js import {...

CVE-2022-39263: Missing token verification in Upstash Adapter

`@next-auth/upstash-redis-adapter` is the Upstash Redis adapter for NextAuth.js, which provides authentication for Next.js. Applications that use `next-auth` Email Provider and `@next-auth/upstash-redis-adapter` before v3.0.2 are affected by this vulnerability. The Upstash Redis adapter implementation did not check for both the identifier (email) and the token, but only checking for the identifier when verifying the token in the email callback flow. An attacker who knows about the victim's email could easily sign in as the victim, given the attacker also knows about the verification token's expired duration. The vulnerability is patched in v3.0.2. A workaround is available. Using Advanced Initialization, developers can check the requests and compare the query's token and identifier before proceeding.

Backdoor.Win32.Augudor.b MVID-2022-0644 Code Execution

Backdoor.Win32.Augudor.b malware suffers from a code execution vulnerability.

Backdoor.Win32.Psychward.b MVID-2022-0645 Hardcoded Credential

Backdoor.Win32.Psychward.b malware suffers from a hardcoded credential vulnerability.