Customer threat assessment 7MAR2016 (rules users see notes)

Security annoucements of interest to the AtomiCorp community, such as vulnerabilities in third party applications.
User avatar
mikeshinn
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 4149
Joined: Thu Feb 07, 2008 7:49 pm
Location: Chantilly, VA

Customer threat assessment 7MAR2016 (rules users see notes)

Unread post by mikeshinn »

This report is a daily analysis of all published vulnerabilities in any product, weaknesses in technologies, exploits Internet wide, current internet threats associated with platforms and products our customer use, and if any action is required to protect their assets from these these vulnerabilities, weaknesses and exploits depending on the Atomicorp product they are using.

Please see this forum post for an explanation of the categories used in this report.

CVEs are sometimes created after a vulnerability is published (sometimes far after it has been made public). When CVEs are referenced, it is because a CVE was created today, not because an issue was resolved today, and it is included here for reference.

ASL users

Summary: No action required.


Already protected against/Known Method/No update required

ATutor LMS install_modules.php CSRF Remote Code Execution Vulnerability
Ukraine Catalog Script Sql injection vulnerability
Backdoor in Custom Content Type Manager

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

None.

Rules only users

Summary: See below if you are using the

Already protected against/Known Method/No update required

ATutor LMS install_modules.php CSRF Remote Code Execution Vulnerability
Ukraine Catalog Script Sql injection vulnerability

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

Backdoor in Wordpress Custom Content Type Manager 0.9.8.8 - The Wordpress Custom Content Type Manager account was compromised in the WordPress Directory and backdoored. All users of versions 0.9.8.8 of the plugin should consider their sites compromised. If you need assistance removing this backdoored version from your sites (updating will not remove the backdoors), please let us know. ASL users are not effected by this compromise.

Note: WAFs can not protect systems from backdoored web applications.
Post Reply