DevSec Selection #21 – WordPress Critical Authentication Bypass, Comparison of Enterprise SAST/DAST and Google Dorks for Bug Bounty

December 1, 2024

Intro

Hi everyone!

I hope you’re doing great.

Recently, we observed a number of high-severity vulnerabilities affecting various popular products.In this newsletter edition, you will find a couple of great technical vulnerability writeups presenting identified security issues with code examples.

For anyone interested, I recommend an article about an authentication bypass in the WordPress Really Simple Security plugin, which is used by 4 million instances. The vulnerability allowed for authenticating without providing valid credentials.

Even if you’re not a Palo Alto user, but you’re interested in web application security, you will enjoy an article about recent authentication bypass and RCE vulnerabilities in Palo Alto PAN-OS.

For DevSecOps and internal security teams looking for enterprise-grade SAST/DAST tooling, I included an amazing comparison of these products.

If you’re a bug bounty hunter or an offensive security specialist, you might be interested in the Google Dorks for Bug Bounty website.

Enjoy the materials and stay secure!

Materials

Are your WordPress sites secure? A critical vulnerability affecting over 4 million installations of the Really Simple Security plugin that allowed attackers to bypass authentication and gain administrative access. The article discusses the vulnerability details, patch updates, and recommendations for site owners, making it crucial for WordPress users and developers.

What critical vulnerabilities are impacting Palo Alto Networks’ SSLVPN appliances? This article explores CVE-2024-0012 and CVE-2024-9474, which involve authentication bypass and privilege escalation. It is ideal for security professionals and network administrators looking to understand and mitigate these risks in their systems.

What insights can you gain from comparing enterprise SAST and DAST products? This repository contains a sheet with a comprehensive overview of various enterprise-level SAST and DAST tools, assessing their features, capabilities, and compatibility. It’s perfect for security professionals and organizations to better understand what major vendors provide.

What are Google Dorks and how can they enhance bug bounty hunting? This website provides various Google search operators used to uncover vulnerabilities and sensitive information on target domains. It’s aimed at aspiring bug bounty hunters and cybersecurity enthusiasts looking to improve their reconnaissance skills.

Are you a Go developer concerned about security vulnerabilities? This article dives into command injection vulnerabilities in Go, explaining what they are, how they occur, and their potential dangers. It offers best practices for mitigation, such as input validation and using safe libraries, along with solutions from Snyk for enhanced code security.

Are your JWT libraries secure against algorithm confusion attacks? This article explores the vulnerabilities of JWT libraries and highlights common strategies developers employ to block these attacks. Aimed at security professionals and developers, it outlines effective coding practices to enhance security in token verification processes.

How can you ensure your AI models are secure? This article introduces Garak, a vulnerability scanner designed for large language models (LLMs) that detects weaknesses such as hallucinations and prompt injections. It’s ideal for developers and AI researchers looking to enhance model security and robustness.

What vulnerabilities were identified in the needrestart utility for Ubuntu Server? This article presents five Local Privilege Escalation vulnerabilities identified by Qualys, affecting numerous systems. It offers insights on potential impacts, mitigation steps, and essential updates. Ideal for IT professionals and system administrators, this advisory emphasizes quick action to safeguard system integrity.

In this article, readers will learn about CVE 2024 10524, a medium severity vulnerability found in GNU’s Wget that could lead to SSRF, phishing, and MiTM attacks. System administrators should update Wget to version 1.25.0 to mitigate risks.

This guide provides a step-by-step approach for security professionals and developers to experiment with the vulnerability in PostgreSQL allowing for modifying environment variables.

This article uncovers a malicious npm package impersonating a WhatsApp web client, executing silent data exfiltration and file destruction. It presents how important is validating utilised software to detect potentially malicious packages.

Interesting Article?

Join DevSec Selection!

DevSec Selection is a bi-weekly Newsletter with the latest outstanding articles related with DevSecOps and application security.


Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments