Threat/Vulnerability report week of July 25 (Rules users)

Security annoucements of interest to the AtomiCorp community, such as vulnerabilities in third party applications.
User avatar
mikeshinn
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 4149
Joined: Thu Feb 07, 2008 7:49 pm
Location: Chantilly, VA

Threat/Vulnerability report week of July 25 (Rules users)

Unread post by mikeshinn »

This report is an analysis of all published vulnerabilities in any product, weaknesses in technologies, exploits Internet wide, current internet threats associated with platforms and products our customer use, and if any action is required to protect their assets from these these vulnerabilities, weaknesses and exploits depending on the Atomicorp product they are using.

Please see this forum post for an explanation of the categories used in this report.

CVEs are sometimes created after a vulnerability is published (sometimes far after it has been made public). When CVEs are referenced, it is because a CVE was created today, not because an issue was resolved today, and it is included here for reference.

ASL users

Summary: No action necessary.

Already protected against/Known Method/No update required

Barracuda Spam And Virus Firewall 5.1.3.007 Remote Root (When protected by the ASL WAF)
PHP gettext 1.0.12 Code Execution
CodoForum 3.2.1 SQL Injection
Micro Focus Filr CSRF / XSS / Code Execution
PHP File Vault 0.9 Directory Traversal / File Read
WordPress Code Snippets 2.6.1 Cross Site Scripting
WordPress Contact Form To Email 1.1.47 Cross Site Scripting
Joomla Showdown 1.5.0 SQL Injection
Neoscreen 4.5 Cross Site Scripting
Neoscreen 4.5 Blind SQL Injection
Joomla Huge IT Gallery 1.1.5 Cross Site Scripting / SQL Injection
Joomla Weblinks Shell Upload
Drupal RESTWS Module Remote PHP Code Execution
WordPress WooCommerce 2.6.2 Cross Site Scripting
WordPress Paid Memberships Pro 1.8.9.3 Cross Site Scripting
PHP 7.0.8 / 5.6.23 / 5.5.37 bzread() OOB Write
MySQL versions 5.7.12 and below Overflows / Memory Corruption / Format String

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

None.

Rules only users

Summary:

PHP 7.0.8 / 5.6.23 / 5.5.37 users should upgrade to address OOB vulnerabilities.
MySQL versions 5.7.12 and below have overflow vulnerabilities, users should upgrade.

Already protected against/Known Method/No update required


Barracuda Spam And Virus Firewall 5.1.3.007 Remote Root (When protected by a modsecurity reverse proxy using the Atomicorp rules)
PHP gettext 1.0.12 Code Execution
CodoForum 3.2.1 SQL Injection
Micro Focus Filr CSRF / XSS / Code Execution
PHP File Vault 0.9 Directory Traversal / File Read
WordPress Code Snippets 2.6.1 Cross Site Scripting
WordPress Contact Form To Email 1.1.47 Cross Site Scripting
Joomla Showdown 1.5.0 SQL Injection
Neoscreen 4.5 Cross Site Scripting
Neoscreen 4.5 Blind SQL Injection
Joomla Huge IT Gallery 1.1.5 Cross Site Scripting / SQL Injection
Joomla Weblinks Shell Upload
Drupal RESTWS Module Remote PHP Code Execution
WordPress WooCommerce 2.6.2 Cross Site Scripting
WordPress Paid Memberships Pro 1.8.9.3 Cross Site Scripting

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

Modsecurity can not protect against system level vulnerabilities such as:

PHP 7.0.8 / 5.6.23 / 5.5.37 bzread() OOB Write
MySQL versions 5.7.12 and below Overflows / Memory Corruption / Format String

Potential Vulnerability/Solution

None.
Post Reply