[CERT-daily] Tageszusammenfassung - 14.07.2022

Daily end-of-shift report team at cert.at
Thu Jul 14 18:25:29 CEST 2022


=====================
= End-of-Day report =
=====================

Timeframe:   Mittwoch 13-07-2022 18:00 − Donnerstag 14-07-2022 18:00
Handler:     Robert Waldner
Co-Handler:  Michael Schlagenhaufer

=====================
=       News        =
=====================

∗∗∗ Month of PowerShell - Working with the Event Log, Part 2 - Threat Hunting with Event Logs ∗∗∗
---------------------------------------------
We continue our look at working with the Windows event log using PowerShell with 10 threat hunting techniques.
---------------------------------------------
https://www.sans.org/blog/working-with-event-log-part-2-threat-hunting-with-event-logs/


∗∗∗ Introducing Decompiler Explorer ∗∗∗
---------------------------------------------
Today, we’re releasing a little side project a few of our developers have been working with the community on: the Decompiler Explorer! This new (free, open source) web service lets you compare the output of different decompilers on small executables. In other words: It’s basically the same thing as Matt Godbolt’s awesome Compiler Explorer, but in reverse.
---------------------------------------------
https://binary.ninja/2022/07/13/introducing-decompiler-explorer.html


∗∗∗ CVE-2022-29885 - Dont Open That Port - A Denial Of Service vulnerability on Apache Tomcat Cluster Service Listener ∗∗∗
---------------------------------------------
While performing the analysis I discovered that this was a part of a research made by 4ra1n, who reported the issue to the Apache Tomcat Security Team on 17 April 2022 and marked as CVE-2022-29885. Nonetheless, I had no luck finding a suitable PoC of the vulnerability.
---------------------------------------------
https://voidzone.me/cve-2022-29885-apache-tomcat-cluster-service-dos/


∗∗∗ Genesis - The Birth of a Windows Process (Part 1) ∗∗∗
---------------------------------------------
This is the first part of a two part series. In this post, I cover how Windows spawns a process, the various APIs and data structures involved and different types of processess available on Windows. The Windows API provides several functions for creating a process. We will go through some of the important APIs and structures Win32 offers before diving into the process creation procedure.
---------------------------------------------
https://fourcore.io/blogs/how-a-windows-process-is-created-part-1


∗∗∗ Exploiting Arbitrary Object Instantiations in PHP without Custom Classes ∗∗∗
---------------------------------------------
PHP’s Arbitrary Object Instantiation is a flaw in which an attacker can create arbitrary objects. This flaw can come in all shapes and sizes.
---------------------------------------------
https://swarm.ptsecurity.com/exploiting-arbitrary-object-instantiations/


∗∗∗ “RedAlert,” LILITH and 0mega leading a wave of Ransomware Campaigns ∗∗∗
---------------------------------------------
Multiple new ransomware groups have surfaced recently, highlighting the adoption of ransomware attacks by TAs for monetary gains.
---------------------------------------------
https://blog.cyble.com/2022/07/12/new-ransomware-groups-on-the-rise/


∗∗∗ Office-Nutzer im Visier: Phishing-Kampagne umgeht Multi-Faktor-Authentifizierung ∗∗∗
---------------------------------------------
Microsofts Sicherheitsforscher haben eine große Phishing-Kampagne aufgedeckt. Dabei stehlen Angreifer Session-Cookies, um MFA-Schutzmaßnahmen zu umgehen.
---------------------------------------------
https://heise.de/-7179750


∗∗∗ PSA: Sudden Increase In Attacks On Modern WPBakery Page Builder Addons Vulnerability ∗∗∗
---------------------------------------------
The Wordfence Threat Intelligence team has been monitoring a sudden increase in attack attempts targeting Kaswara Modern WPBakery Page Builder Addons. This ongoing campaign is attempting to take advantage of an arbitrary file upload vulnerability, tracked as CVE-2021-24284, which has been previously disclosed and has not been patched on the now closed plugin.
---------------------------------------------
https://www.wordfence.com/blog/2022/07/attacks-on-modern-wpbakery-page-builder-addons-vulnerability/


∗∗∗ YouTuber-Cash: Vorsicht vor Abzocke ∗∗∗
---------------------------------------------
YouTube-Videos schauen und damit Geld verdienen? Angebote wie das von youtuber.ltd klingen verlockend, doch statt der Auszahlung warten Abzocke-Maschen auf Sie. Vertrauen Sie keinen Versprechen online, schnell viel Geld zu verdienen!
---------------------------------------------
https://www.watchlist-internet.at/news/youtuber-cash-vorsicht-vor-abzocke/



=====================
=  Vulnerabilities  =
=====================

∗∗∗ X.org servers update closes 2 security holes, adds neat component tweaks ∗∗∗
---------------------------------------------
Arbitrary code execution flaws in the X Keyboard Extension were bad news X.org has released a bunch of updates, which includes closing two security holes and, yes, this affects Wayland users too.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2022/07/13/xorg_servers_updated/


∗∗∗ Tableau Server Leaks Sensitive Information From Reflected XSS ∗∗∗
---------------------------------------------
GoSecure Titan Labs has identified a vulnerability within the Tableau Server that could allow malicious actors to extract sensitive data from the application. Tableau Server is an analytics platform owned by Salesforce used to see and understand data.
---------------------------------------------
https://www.gosecure.net/blog/2022/07/13/tableau-server-leaks-sensitive-information-from-reflected-xss/


∗∗∗ IBM Security Bulletins 2022-07-13 ∗∗∗
---------------------------------------------
IBM Db2, IBM MQ Appliance, IBM i, IBM WebSphere Application Server, IBM Engineering Lifecycle Optimization, IBM Cloud Pak, IBM Netezza Platform, IBM Security Verify Information Queue, IBM Security Verify Governance.
---------------------------------------------
https://www.ibm.com/blogs/psirt/


∗∗∗ Lücke in VMware vCenter Server und Cloud Foundation zum Teil abgedichtet ∗∗∗
---------------------------------------------
In VMwares vCenter Server und der Cloud Foundation klafft eine Sicherheitslücke in der Integrated Windows Authentication. Nun gibt es ein Software-Update.
---------------------------------------------
https://heise.de/-7179181


∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (request-tracker4), Fedora (kernel and vim), Mageia (gerbv, gnupg2, pgadmin4, and python-coookiecutter), Slackware (xorg), SUSE (cifs-utils, gmp, gnutls, libnettle, kernel, libsolv, libzypp, zypper, logrotate, openssl-1_1, opera, squid, and virglrenderer), and Ubuntu (ca-certificates, git, linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon, linux, linux-aws, linux-azure, linux-azure-5.4, linux-azure-fde, linux-gke, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-kvm, linux, linux-aws, linux-azure, linux-gcp, linux-gke, linux-ibm, linux-kvm, linux-lowlatency, linux-oracle, linux-aws, linux-oem-5.14, and vim). 
---------------------------------------------
https://lwn.net/Articles/901190/


∗∗∗ UEFI-Firmware-Bug gefährdet über 70 Lenovo Notebooks (Juli 2022) ∗∗∗
---------------------------------------------
Hinweis für Blog-Leser und -Leserinnen, die Notebooks von Lenovo (und IBM) verwenden. Sicherheitsforscher von ESET haben gravierenden Schwachstellen in der UEFI-Firmware von Lenovo Notebooks gefunden, die eine Übernahme des Betriebssystems in der frühen Boot-Phase ermöglicht.
---------------------------------------------
https://www.borncity.com/blog/2022/07/14/uefi-firmware-bug-gefhrdet-ber-70-lenovo-notebooks-juli-2022/


∗∗∗ Internet Explorer 11: Update KB5015805 (12. Juli 2022) ∗∗∗
---------------------------------------------
Microsoft hat zum 12. Juli 2022 ein Sicherheitsupdate (KB5015805) für den Internet Explorer freigegeben. Dieses ist aber nur für ausgesuchte Windows-Versionen als kumulatives Update separat erhältlich. Hier ein Überblick über diesen Patch, der Schwachstellen im Browser schließen soll.
---------------------------------------------
https://www.borncity.com/blog/2022/07/14/internet-explorer-11-update-kb5015805-12-juli-2022/


∗∗∗ Entity Print - Moderately critical - Multiple: Remote Code Execution, Information disclosure - SA-CONTRIB-2022-048 ∗∗∗
---------------------------------------------
https://www.drupal.org/sa-contrib-2022-048


∗∗∗ K14335949: Intel processors vulnerability CVE-2022-24436 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K14335949


∗∗∗ K43357358: AMD processors vulnerability CVE-2022-23823 ∗∗∗
---------------------------------------------
https://support.f5.com/csp/article/K43357358


∗∗∗ Juniper JUNOS (EX, MX, PTX, QFX Series): Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0684


∗∗∗ Juniper JUNOS (Verschiedene Plattformen): Mehrere Schwachstellen ermöglichen Denial of Service ∗∗∗
---------------------------------------------
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0683


∗∗∗ Lenovo XClarity: Mehrere Schwachstellen ∗∗∗
---------------------------------------------
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0687

-- 
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/cgi-bin/mailman/listinfo/daily




More information about the Daily mailing list