Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

TEL AVIV, Israel, 11th November 2024, CyberNewsWire

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

FBI Warns US Organizations of Fake Emergency Data Requests Made by Cybercriminals

The FBI is seeing an increase in threat actors using fake emergency data requests to harvest information from US companies.

The post FBI Warns US Organizations of Fake Emergency Data Requests Made by Cybercriminals appeared first on SecurityWeek.

SecurityWeek – ​Read More

This mysterious iPhone upgrade protects your data from thieves

Is your iPhone rebooting after being inactive? Here’s why, and how it can help you.

Latest stories for ZDNET in Security – ​Read More

Exclusive: Northflank scores $22.3 million to make cloud infrastructure less of a nightmare for developers

Three of Northflank's leaders at the company's offices in London. From left: Frederik Brix, co-founder and chief technology officer; Chase Roberts, chief operating officer; and Will Stewart, co-founder and chief executive.


Northflank raises $22.3M to simplify cloud deployment, offering developers a third path between inflexible platforms and costly internal tools, with backing from Bain Capital Ventures.Read More

Security News | VentureBeat – ​Read More

Path Traversal Vulnerability in WPLMS WordPress Theme Exposes Websites to RCE 

Vulnerability

Overview 

A critical path traversal vulnerability, CVE-2024-10470, has been identified in the WPLMS Learning Management System (LMS) theme for WordPress. This vulnerability enables unauthenticated attackers to read and delete arbitrary files on the server due to insufficient file path validation in the theme’s readfile and unlink functions.  

The flaw affects all versions of WordPress up to and including 4.962 and carries a CVSS score of 9.8. 

According to the bug description published on GitHub under the account moniker RandomRobbieBF, the flaw impacts WordPress sites running WPLMS even if the theme is not actively enabled. This likely puts thousands of LMS-driven websites at risk of unauthorized data access, site disruption, and potential full system compromise. 

The CVE-2024-10740’s original finding is attributed to an independent researcher Friderika Baranyai, aka Foxyyy. 

Vulnerability Details 

  • CVE: CVE-2024-10470 
  • Type: Path Traversal (CWE-22) 
  • Affected Theme: WPLMS Learning Management System for WordPress 
  • Affected Versions: <= 4.962 
  • Severity: Critical (CVSS 9.8) 
  • Impact: Confidentiality, Integrity, Availability 
  • Found By: Friderika Baranyai, aka Foxyyy 

Exploitation Details 

This vulnerability allows attackers to delete critical files, such as wp-config.php, without needing authentication. Deleting this file, which contains essential WordPress configuration settings, could enable attackers to gain remote control over the affected server, leading to potential code execution and full site compromise. 

While there is no publicly available proof-of-concept (PoC) or evidence of active exploitation, the nature of this vulnerability means that attackers could send crafted requests to delete or read files arbitrarily.  

For example, the download_export_zip parameter within certain WPLMS theme scripts can be exploited to read or delete sensitive server files, leading to significant security risks for affected WordPress installations. 

A sample crafted request, as described on GitHub, which could exploit this vulnerability is as follows: 

POST /wp-content/themes/wplms/setup/installer/envato-setup-export.php HTTP/1.1 

Host: [Target-IP] 

Content-Type: application/x-www-form-urlencoded 

Content-Length: 29 

download_export_zip=1&zip_file=.htaccess 

This request manipulates the zip_file parameter to target and potentially delete files like .htaccess, which could lead to server misconfiguration or unauthorized file access. 

Mitigation and Recommendations 

Website administrators are advised to take the following actions to address this bug: 

  1. Deactivate and Remove the WPLMS Theme: If possible, temporarily deactivate the WPLMS theme until a patch is available. Remove it if it’s not essential to your website’s functionality. 
  2. Apply Strong Access Controls: Restrict access to critical files, such as wp-config.php, and ensure that file permissions are strictly enforced to prevent unauthorized deletion or modification. 
  3. Implement File Integrity Monitoring: Regularly monitor the integrity of critical WordPress files. Immediate alerts on file deletion or modifications can provide timely warnings of potential exploitation. 
  4. Back Up WordPress Installations Regularly: Maintain regular backups of your website’s files and database to ensure rapid recovery in the event of an attack. 
  5. Web Application Firewall (WAF): Use a WAF to filter potentially malicious requests. This can help prevent attackers from exploiting path traversal vulnerabilities. 
  6. Monitor for Updates: Regularly check for updates from the WPLMS theme developer and apply any available patches as soon as they are released. The vulnerability is resolved in version 4.963, so updating to this version will eliminate the risk. 
  7. Isolate WordPress Installations: For sites heavily dependent on the WPLMS theme, consider isolating the installation in a separate, highly controlled environment to reduce the risk of lateral movement if exploited. 

Conclusion 

The CVE-2024-10470 vulnerability in the WPLMS theme for WordPress represents a severe security threat to affected websites. By allowing unauthenticated file deletion, this flaw poses risks of unauthorized access, remote code execution, and potential full compromise of WordPress installations. 

Administrators are urged to take immediate steps to secure their systems, including deactivating the theme if feasible, implementing access controls, and applying security patches as soon as they are available. 

Following these recommendations, organizations can mitigate potential exploitation and protect their WordPress environments from unauthorized access and service disruption. 

Source: 

https://nvd.nist.gov/vuln/detail/CVE-2024-10470
https://github.com/RandomRobbieBF/CVE-2024-10470
https://themeforest.net/item/wplms-learning-management-system/6780226
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-themes/wplms/wplms-learning-management-system-for-wordpress-4962-unauthenticated-arbitrary-file-read-and-deletion
https://www.wordfence.com/threat-intel/vulnerabilities/researchers/friderika-baranyai

The post Path Traversal Vulnerability in WPLMS WordPress Theme Exposes Websites to RCE  appeared first on Cyble.

Blog – Cyble – ​Read More

No Fix for Critical Command Injection Vulnerability in Legacy D-Link NAS Devices  

Vulnerability

Overview 

A recently identified command injection vulnerability in D-Link network-attached storage (NAS) devices exposes over 61,000 internet-connected units to potential exploitation.  

The flaw, tracked as CVE-2024-10914, allows unauthenticated attackers to inject arbitrary commands by exploiting the name parameter in the cgi_user_add command. 

The vulnerability affects legacy D-Link NAS devices, primarily used by small businesses, and holds a critical CVSS score of 9.2, calling for an immediate need for mitigation. 

This vulnerability is especially concerning as D-Link has classified these devices as end-of-life (EOL) and end-of-service (EOS), meaning they will no longer receive security updates or patches. D-Link has recommended that users retire affected devices or, at minimum, isolate them from public internet access. 

Affected Devices and Vulnerability Scope 

The CVE-2024-10914 command injection vulnerability impacts several D-Link NAS models that are no longer supported. The affected devices include: 

  • DNS-320 – Version 1.00 
  • DNS-320LW – Version 1.01.0914.2012 
  • DNS-325 – Versions 1.01, 1.02 
  • DNS-340L – Version 1.08 

The vulnerability lies in the account_mgr.cgi script, specifically when processing the name parameter within the cgi_user_add command. Due to insufficient input sanitization, attackers can manipulate this parameter to execute arbitrary shell commands, potentially compromising all data on the device.  

According to a scan conducted on the FOFA platform by security researcher NetSecFish, more than 61,000 vulnerable devices are accessible from unique IP addresses globally, showcasing the extensive risk this flaw poses to users. 

Exploitation Details 

Exploiting CVE-2024-10914 requires minimal technical knowledge. Attackers can craft a simple HTTP GET request to the vulnerable device’s IP address, embedding malicious commands within the name parameter, as shown below: 

curl “http://[Target-IP]/cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;<INJECTED_SHELL_COMMAND>;%27” 

The above command triggers the cgi_user_add function, injecting the shell command specified by the attacker, effectively granting unauthorized control over the device. This vulnerability (CWE-77) poses a severe risk, as command injection attacks can lead to complete device takeover, unauthorized access to stored data, and the potential for lateral movement within a network. 

D-Link’s Response and Recommendations 

D-Link released an advisory acknowledging the vulnerability and confirming that affected devices have reached end-of-life (EOL) status. As a result, they no longer receive firmware updates or security patches, meaning that no official fix will be provided.  

“If a product has reached the End of Support (“EOS”) or End of Life (“EOL”), it typically does not receive further extended support or development. Typically, D-Link cannot resolve device or firmware issues for these products since all development and customer support have ceased,” the company said. 

D-Link advises users to replace these NAS devices with more secure and supported models to mitigate the risk of exploitation. 

For users who cannot immediately retire these devices, D-Link has issued the following recommendations: 

  1. Isolate Vulnerable NAS Devices: Disconnect the affected NAS devices from the public internet to prevent external exploitation. 
  2. Restrict Access: Limit access to the device by configuring firewall rules or network access controls that restrict traffic to trusted internal networks only. 
  3. Update Access Credentials: Frequently update and strengthen device passwords to mitigate potential unauthorized access and ensure encryption is enabled for wireless connections. 
  4. Consider Third-Party Firmware: For advanced users, third-party firmware may provide additional security updates, though it voids any remaining warranty and is unsupported by D-Link. 

        Security Implications and Best Practices 

        With over 61,000 potentially exposed devices and no available patch, this vulnerability has significant implications. Organizations using these NAS devices to store or transfer sensitive information are advised to take immediate action to mitigate potential breaches

        Beyond D-Link’s recommendations, organizations can adopt additional best practices to minimize their exposure to this risk: 

        • Network Segmentation: Place vulnerable devices in segmented network zones to prevent attackers from moving laterally if they gain initial access. 
        • Regular Vulnerability Scanning: Implement frequent scanning to identify exposed or vulnerable devices within the network. 
        • Monitor Network Traffic: Set up network monitoring to detect unusual traffic patterns or access attempts, which could indicate exploitation. 
        • Cybersecurity Awareness: Inform employees and network administrators about this vulnerability to reinforce secure practices for managing NAS devices. 

        Conclusion 

        CVE-2024-10914 represents a critical risk to D-Link NAS device users, particularly as these devices will not receive security patches due to their EOL/EOS status. Immediate action is necessary to mitigate this risk, either by retiring affected devices or by enforcing strict access controls. For businesses and individuals relying on these legacy devices, upgrading to secure, supported hardware is the most effective solution to maintain data integrity and safeguard against potential threats. 

        References: 

        https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10413
        https://netsecfish.notion.site/Command-Injection-Vulnerability-in-name-parameter-for-D-Link-NAS-12d6b683e67c80c49ffcc9214c239a07

        The post No Fix for Critical Command Injection Vulnerability in Legacy D-Link NAS Devices   appeared first on Cyble.

        Blog – Cyble – ​Read More

        Cyberattack Cost Oil Giant Halliburton $35 Million

        In its latest financial report, Halliburton said the recent cybersecurity incident has so far cost the company $35 million.

        The post Cyberattack Cost Oil Giant Halliburton $35 Million appeared first on SecurityWeek.

        SecurityWeek – ​Read More

        Bitcoin Fog Operator Gets 12.5 Years for Longest-Running Bitcoin Laundering

        Bitcoin Fog operator sentenced to 12.5 years for laundering $400M in crypto. The dark web’s longest-running mixer processed…

        Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

        AI’s math problem: FrontierMath benchmark shows how far technology still has to go

        Credit: VentureBeat made with Midjourney


        FrontierMath, a new benchmark from Epoch AI, challenges advanced AI systems with complex math problems, revealing how far AI still has to go before achieving true human-level reasoning.Read More

        Security News | VentureBeat – ​Read More

        Debt Relief Firm Forth Discloses Data Breach Impacting 1.5 Million People

        Forth says the personal information of 1.5 million people was compromised in a May 2024 data breach.

        The post Debt Relief Firm Forth Discloses Data Breach Impacting 1.5 Million People appeared first on SecurityWeek.

        SecurityWeek – ​Read More