1 min read
Control Gap Vulnerability Roundup: January 14th to January 20th
This week saw the publication of 712 new CVE IDs. Of those, 247 have not yet been assigned official CVSS scores, however, of the ones that were,...
3 min read
Zach Matthews : Jan 20, 2023 10:30:00 AM
This week saw the publication of 712 new CVE IDs. Of those, 328 have not yet been assigned official CVSS scores, however, of the ones that were, approximately 17% were of critical severity, 49% were high, 33% were medium, and 1% were low. Listed below are the vulnerabilities that caught our attention:
The modern threat landscape represents an ever-changing vista of vulnerabilities, tools, tactics, and procedures which pose an existential threat to the security of organizations’ IT infrastructures. A key part of an evergreen security program is to maintain an up-to-date knowledge base of actionable threat intelligence that an organization can leverage to improve its security posture. Where dozens of novel threats and vulnerabilities become public each week, it can be challenging for IT professionals to keep pace. Control Gap intends to separate the signal from the noise by highlighting in this weekly segment newly disclosed vulnerabilities that have been assigned a CVE ID and which may be exceedingly novel, widespread, critical, or otherwise noteworthy.
The available threat intelligence at time of writing is documented below. Updates will be clearly marked.
Real-World Exploitability Low |
Exploited in the Wild Unknown |
Available Public Exploits No |
Last year, Palo Alto researchers from the organizations “Unit 42” identified a remote code execution / arbitrary file write vulnerability in versions less than 9.0.0 in the open-source JSON Web Token library maintained by Auth0. The hugely popular library implements JSON Web Tokens “JWT”s as specified in RFC 7519, the project is available through npm and at the time of writing boasts 11.4 million weekly downloads. The vulnerability, CVE-2022-23529, affects the “jwt.verify” method and can effectively lead to remote code execution if an attacker can control the “secretOrPublicKey” parameter of the function call. Control of the “secretOrPublicKey” parameter is a significant hurdle for attackers to overcome, making the vulnerability much more difficult to exploit. However, the vast scope and usage of the library throughout the industry has experts warning that the vulnerability could propagate through software supply chains. Auth0 released a patch with version 9.0.0 of the library on December 21, 2022, along with a short advisory via GitHub.
Real-World Exploitability High |
Exploited in the Wild Yes |
Available Public Exploits No |
During the Microsoft Patch Tuesday for January 2023, Microsoft addressed a privilege escalation vulnerability CVE-2023-21674 which was originally discovered and reported to Microsoft by Avast’s Threat Labs team. Following the Tuesday patch release, Avast addressed their finding in a short twitter thread stating that exploitation of the vulnerability would allow an attacker to “corrupt Windows kernel memory from the browser sandbox”. Avast hypothesized that the exploit would likely have been chained with a different browser remote code execution 0-day as part of a larger exploit chain. The vulnerability affects a wide range of Windows versions up to and including the latest Windows 11 builds. Microsoft has released its own update guide assigning the vulnerability a CVSS score of 8.8, Microsoft has confirmed that the vulnerability was being exploited in the wild.
Real-World Exploitability High |
Exploited in the Wild Unknown |
Available Public Exploits Yes |
The Researchers at Tenable, the company behind the popular security assessment tool Nessus, identified a number of WordPress plugins with simple but scary SQL injection vulnerabilities and detailed all of their findings in a single advisory post. The most popular vulnerable plugin identified in the research was the Paid Memberships Pro plugin for WordPress, which is described as “the most complete member management and membership subscriptions plugin for WordPress”. On wordpress.org the plugin currently has more than 100,000 installations. This plugin was found to not escape the “code” parameter used within the “pmpro/v1/order” endpoint. An unauthenticated user could send crafted requests to arbitrarily query the SQL database. The vulnerability affects versions of the plugin less than 2.9.8, a patch has been released by the plugin maintainers and the vulnerability is being tracked as CVE-2023-23488.
Real-World Exploitability High |
Exploited in the Wild Unknown |
Available Public Exploits No |
The Israel National Cyber Directorate has disclosed multiple vulnerabilities for the FTP server “Rumpus” including persistent cross-site scripting, cross-site request forgery, reflected cross-site scripting and a bug within the server’s token verification logic. The disclosure from INCD contains very little information on each individual vulnerability, and according to the CVE records, Maxum Development (the creators of Rumpus FTP) have not addressed the findings. Based on the lack of activity on Maxum Development’s website and Twitter, it appears as though Rumpus FTP may have been abandoned by the developer. According to this Shodan query, there are over 6000 publicly exposed Rumpus instances at the time of writing. The CVE ID for each vulnerability is as follows:
1 min read
This week saw the publication of 712 new CVE IDs. Of those, 247 have not yet been assigned official CVSS scores, however, of the ones that were,...
This week saw the publication of 425 new CVE IDs. Of those, 240have not yet been assigned official CVSS scores, however, of the ones that were,...
1 min read
This week saw the publication of 537 new CVE IDs. Of those, 480 have not yet been assigned official CVSS scores, however, of the ones that were,...