BugAlertDotOrg's profile picture. http://BugAlert.org is a service for alerting security and IT professionals of high-impact and 0day vulnerabilities. Follow for vuln information and general updates.

BugAlert.org

@BugAlertDotOrg

http://BugAlert.org is a service for alerting security and IT professionals of high-impact and 0day vulnerabilities. Follow for vuln information and general updates.

A privilege escalation flaw has been found, and is being actively exploited, in Atlassian Confluence, and has been assigned a bug alert severity of 'very high'. Atlassian recommends removing installations from the Intern... bugalert.org/content/notice… #BugAlertNotice


We will be leaving Twitter in the coming days and setting up on the infosec.exchange Mastodon server. An announcement will be made when we're ready to transition. In the meantime, please consider joining our Slack. Spread the word 🙏 #BugAlertNews join.slack.com/t/bug-alert/sh…

BugAlertDotOrg's tweet image. We will be leaving Twitter in the coming days and setting up on the infosec.exchange Mastodon server. An announcement will be made when we're ready to transition. In the meantime, please consider joining our Slack. Spread the word 🙏 #BugAlertNews

join.slack.com/t/bug-alert/sh…

This is a test notice, which you have opted in to. Bug Alert has completed integrating Twilio support for international calls and SMS. Save our phone number to your contacts! bugalert.org/content/notice… #BugAlertNotice


tl;dr on the OpenSSL vuln: it seemed bad originally, but then OpenSSL realized it wasn't critical after all. Treat it like any other software flaw and follow your normal patching cycle. Unlikely to be exploited in real-world configurations.


On Tuesday Nov 1st between 9-11am EDT, a security fix will be released for a critical OpenSSL 3.0.x vuln. Ubuntu 22.04 & RHEL 9 impacted. Docker ubuntu:latest also impacted. Latest releases of Alpine/Debian/AL2 not impacted, they use 1.1.x lineage. Last critical (2016) was RCE.

Ten tweet nie jest już dostępny.

Still lots of unwarranted panic on this CVE, which some people are referring to as #text4shell. It's clear that this vulnerability has a number of preconditions that are unlikely to be found in the real world. There is no cause for alarm.

Bug Alert is watching CVE-2022-42889 (RCE in Apache Commons Text v1.5 - v1.9) carefully. So far, not seeing much evidence that this is widely exploitable, but we'll fire off a notice if that changes.



Bug Alert is watching CVE-2022-42889 (RCE in Apache Commons Text v1.5 - v1.9) carefully. So far, not seeing much evidence that this is widely exploitable, but we'll fire off a notice if that changes.


FYI if you host a Bitbucket install, unauth RCE: confluence.atlassian.com/bitbucketserve… Not in widespread enough use for a full-on Bug Alert notice, though.


Multiple Vulnerabilities have been disclosed in Atlassian Products. A hardcoded credential vulnerability in Questions for Confluence, and Servlet Filter Bypass Vulnerabilities have been found in multiple Atlassian produc... bugalert.org/content/notice… #BugAlertNotice


Patches now available for Atlassian Confluence: atlassian.com/software/confl…


An authentication bypass vulnerability has been found in Atlassian Jira. This issue can be exploited in the default configuration, and has been assigned a bug alert severity of 'very high'. bugalert.org/content/notice… #BugAlertNotice


To konto obecnie nikogo nie obserwuje
Loading...

Something went wrong.


Something went wrong.