Skip to content

トピトピニュース

Header Image
Archive

Month: May 2022

251 Posts

Featured

Posted byByakuya Biz Books
シンガポール発のコーヒーチェーン「フラッシュコーヒー」が2年で250店舗に拡大した理由
Posted byGoogle Japan Blog
個人情報を考える週間: パスワードとオンライン アカウントを安全に保つためのヒント
Posted byねっと特報
ウクライナ戦争に見るワイパー攻撃の実態とデジタル情報操作
Posted byFunglr Games(日本語)
「エースコンバット」と「トップガン マーヴェリック」が夢のコラボ!マーヴェリックスキンの「F-14A Tomcat」や「F/A-18E Super Hornet」が登場!

[org.richfaces:richfaces-core] RichFaces vulnerable to Expression Language Injection

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/08/2022

JBoss RichFaces 4.5.3 through 4.5.17 allows unauthenticated remote attackers to inject an arbitrary expression language (EL) variable mapper and execute arbitrary Java code via a MediaOutputResource’s resource request, aka RF-14309.
References

https:/…

[org.jvnet.hudson.plugins:hipchat] Jenkins HipChat Plugin allows credential capture due to incorrect authorization

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/23/2022

An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to send test notifications to an attacker-specified HipChat server with attacker-specified…

[org.jvnet.hudson.plugins:hipchat] Jenkins HipChat Plugin allows attackers with Overall/Read access to obtain credential IDs

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/23/2022

An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to obtain credentials IDs for credentials stored in Jenkins. As of version 2.2.1, an enume…

[org.apache.geode:geode-core] Apache Geode vulnerable to Incorrect Authorization

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/08/2022

When an Apache Geode server versions 1.0.0 to 1.4.0 is configured with a security manager, a user with DATA:WRITE privileges is allowed to deploy code by invoking an internal Geode function. This allows remote code execution. Code deployment should be …

[io.jenkins.blueocean:blueocean] Missing Authorization in Jenkins Blue Ocean Plugin

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/02/2022

The optional Run/Artifacts permission can be enabled by setting a Java system property. Blue Ocean did not check this permission before providing access to archived artifacts, Item/Read permission was sufficient.
References

https://nvd.nist.gov/vuln/d…

[org.richfaces:richfaces-core] Richfaces vulnerable to arbitrary code execution

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/08/2022

The RichFaces Framework 3.X through 3.3.4 is vulnerable to Expression Language (EL) injection via the UserResource resource. A remote, unauthenticated attacker could exploit this to execute arbitrary code using a chain of java serialized objects via or…

[org.jenkins-ci.main:jenkins-core] Incorrect Authorization in Jenkins Core

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/09/2022

Jenkins before versions before 2.44 are vulnerable to an insufficient permission check for periodic processes (SECURITY-389). The URLs /workspaceCleanup and /fingerprintCleanup did not perform permission checks, allowing users with read access to Jenki…

[org.apache.struts:struts2-core] Code injection in Apache Struts

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/12/2022

A vulnerability introduced by forcing parameter inclusion in the URL and Anchor Tag allows remote command execution, session access and manipulation and XSS attacks.
both the s:url and s:a tag provide an includeParams attribute.
The main scope of that …

[org.apache.struts:struts2-core] Server side object manipulation in Apache Struts

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/04/2022

OGNL provides, among other features, extensive expression evaluation capabilities. This vulnerability allows a malicious user to bypass the ‘#’-usage protection built into the ParametersInterceptor, thus being able to manipulate server side context obj…

[org.apache.struts:struts2-core] Code injection in Apache Struts

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/04/2022

The Struts 2 DefaultActionMapper supports a method for short-circuit navigation state changes by prefixing parameters with “action:” or “redirect:”, followed by a desired navigational target expression. This mechanism was intended to help with attachin…

Posts navigation

Previous Posts 1 … 21 22 23 24 25 26 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close