Threat/Vulnerability report week of January 15th

Security annoucements of interest to the AtomiCorp community, such as vulnerabilities in third party applications.
User avatar
mikeshinn
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 4119
Joined: Thu Feb 07, 2008 7:49 pm
Location: Chantilly, VA

Threat/Vulnerability report week of January 15th

Unread post by mikeshinn »

This report is an analysis of all published vulnerabilities in any product, weaknesses in technologies, exploits Internet wide, current internet threats associated with platforms and products our customers use, and if any action is required to protect their assets from these these vulnerabilities, weaknesses and exploits depending on the Atomicorp product(s) they are using.

Please see this forum post for an explanation of the categories used in this report.

CVEs are sometimes created after a vulnerability is published (sometimes far after it has been made public). When CVEs are referenced, it is because a CVE was created today, not because an issue was resolved today, and it is included here for reference.

ASL users

Summary: No update required. ASL systems were already immune to all published vulnerabilities this week.

Already protected against/Known Method/No update required

glibc getcwd() Local Privilege Escalation
Agora Project 3.3.5 Cross Site Scripting
CentOS Web Panel 0.9.8.12 Cross Site Scripting
Fundly 1.0.0 Cross Site Scripting
LiveZilla 7.0.6.0 Cross Site Scripting
Online Hotel Booking System Pro 1.3 SQL Injection
Photo Vault 1.2 Brute Forcing Issue
Shopware 5.2.5 / 5.3 Cross Site Scripting
SugarCRM 3.5.1 Cross Site Scripting
Synology Photo Station 6.8.2-3461 Remote Code Execution
Toplist 2 SQL Injection / Backdoor Account / Shell Upload
Vanilla 2.0.18.8 Local File Inclusion
Zomato Clone - Arbitrary File Upload


New Method/Update Available

No updates required for vulnerabilities released this week.

Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

None.

Rules only users

Summary:

Rules only users on the Linux platform may be vulnerable to the glibc getcwd() Local Privilege Escalation ( CVE-2018-1000001) vulnerability. ASL users are immune to this vulnerability.

Already protected against/Known Method/No update required

Agora Project 3.3.5 Cross Site Scripting
CentOS Web Panel 0.9.8.12 Cross Site Scripting
Fundly 1.0.0 Cross Site Scripting
LiveZilla 7.0.6.0 Cross Site Scripting
Online Hotel Booking System Pro 1.3 SQL Injection
Photo Vault 1.2 Brute Forcing Issue
Shopware 5.2.5 / 5.3 Cross Site Scripting
SugarCRM 3.5.1 Cross Site Scripting
Synology Photo Station 6.8.2-3461 Remote Code Execution
Toplist 2 SQL Injection / Backdoor Account / Shell Upload
Vanilla 2.0.18.8 Local File Inclusion
Zomato Clone - Arbitrary File Upload

New Method/Update Available

No updates required for vulnerabilities released this week.

Doesnt protect against/Solution

Web application firewalls, including modsecurity, can not protect a system against system level attacks. The follow are vulnerabilities that may effect your system if you are not using ASL:

glibc getcwd() Local Privilege Escalation ( CVE-2018-1000001) (Note: The ASL kernel prevents this vulnerability, all systems running ASL kernels are immune to this vulnerability)

Potential Vulnerability/Solution

None.
Post Reply