This report is an analysis of all published vulnerabilities in any product, weaknesses in technologies, exploits Internet wide, current internet threats associated with platforms and products our customers use, and if any action is required to protect their assets from these these vulnerabilities, weaknesses and exploits depending on the Atomicorp product(s) they are using.
Please see this forum post for an explanation of the categories used in this report.
CVEs are sometimes created after a vulnerability is published (sometimes far after it has been made public). When CVEs are referenced, it is because a CVE was created today, not because an issue was resolved today, and it is included here for reference.
ASL users
Summary: No update required. ASL systems were already immune to all published vulnerabilities this week.
Already protected against/Known Method/No update required
Advantech WebAccess 8.0-2015.08.16 SQL Injection
Gnew 2018.1 Cross Site Request Forgery
Hot Scripts Clone Script 1.0 SQL Injection
Joomla! CP Event Calendar 3.0.1 SQL Injection
Joomla! JS Support Ticket 1.1.0 Cross Site Request Forgery
Joomla! Jtag Members Directory 5.3.7 Arbitrary File Download
Joomla! Picture Calendar For Joomla 3.1.4 Directory Traversal
Joomla! Visual Calendar 3.1.3 SQL Injection
Kaltura Remote PHP Code Execution
KeystoneJS Cross Site Request Forgery
LiveCRM SaaS Cloud 1.0 Cross Site Scripting
Multilanguage Real Estate MLM Script 3.0 SQL Injection
OwnCloud Server 10.0 User Enumeration
Photography CMS 1.0 Cross Site Request Forgery
Professional Local Directory Script 1.0 SQL Injection
Red Hat Security Advisory 2018-0163-01
SugarCRM Community Edition 6.5.26 SQL Injection
Task Rabbit Clone 1.0 SQL Injection
TSiteBuilder 1.0 SQL Injection
Tumder 2.1 SQL Injection
Vastal I-Tech Facebook Clone 2.9.9 SQL Injection
Wchat 1.5 SQL Injection
WordPress Email Subscribers And Newsletters 3.4.7 Information Disclosure
WordPress Good LMS SQL Injection
WordPress Propertyhive 1.4.14 Cross Site Scripting
WordPress Splashing Images 2.1 Cross Site Scripting / PHP Object Injection
Zechat 1.5 SQL Injection
New Method/Update Available
No updates required for vulnerabilities released this week.
Doesnt protect against/Solution
None.
Potential Vulnerability/Solution
None.
Rules only users
Summary:
Rules only users on the Linux platform may be vulnerable to a buffer overflow in the LDAP service on Redhat and Centos systems (RHSA-2018:0163) vulnerability. ASL users that are using the ASL kernel are immune to this vulnerability.
Already protected against/Known Method/No update required
Advantech WebAccess 8.0-2015.08.16 SQL Injection
Gnew 2018.1 Cross Site Request Forgery
Hot Scripts Clone Script 1.0 SQL Injection
Joomla! CP Event Calendar 3.0.1 SQL Injection
Joomla! JS Support Ticket 1.1.0 Cross Site Request Forgery
Joomla! Jtag Members Directory 5.3.7 Arbitrary File Download
Joomla! Picture Calendar For Joomla 3.1.4 Directory Traversal
Joomla! Visual Calendar 3.1.3 SQL Injection
Kaltura Remote PHP Code Execution
KeystoneJS Cross Site Request Forgery
LiveCRM SaaS Cloud 1.0 Cross Site Scripting
Multilanguage Real Estate MLM Script 3.0 SQL Injection
OwnCloud Server 10.0 User Enumeration
Photography CMS 1.0 Cross Site Request Forgery
Professional Local Directory Script 1.0 SQL Injection
SugarCRM Community Edition 6.5.26 SQL Injection
Task Rabbit Clone 1.0 SQL Injection
TSiteBuilder 1.0 SQL Injection
Tumder 2.1 SQL Injection
Vastal I-Tech Facebook Clone 2.9.9 SQL Injection
Wchat 1.5 SQL Injection
WordPress Email Subscribers And Newsletters 3.4.7 Information Disclosure
WordPress Good LMS SQL Injection
WordPress Propertyhive 1.4.14 Cross Site Scripting
WordPress Splashing Images 2.1 Cross Site Scripting / PHP Object Injection
Zechat 1.5 SQL Injection
New Method/Update Available
No updates required for vulnerabilities released this week.
Doesnt protect against/Solution
Web application firewalls, including modsecurity, can not protect a system against system level attacks. The follow are vulnerabilities that may effect your system if you are not using ASL:
Red Hat Security Advisory 2018-0163-01 (Note: The ASL kernel prevents this vulnerability, all systems running ASL kernels are immune to this vulnerability)
Potential Vulnerability/Solution
None.