Intro
Hi everyone!
I hope you’re doing great.
Recently, we observed a number of high-severity vulnerabilities affecting various popular products.In this newsletter edition, you will find a couple of great technical vulnerability writeups presenting identified security issues with code examples.
For anyone interested, I recommend an article about an authentication bypass in the WordPress Really Simple Security plugin, which is used by 4 million instances. The vulnerability allowed for authenticating without providing valid credentials.
Even if you’re not a Palo Alto user, but you’re interested in web application security, you will enjoy an article about recent authentication bypass and RCE vulnerabilities in Palo Alto PAN-OS.
For DevSecOps and internal security teams looking for enterprise-grade SAST/DAST tooling, I included an amazing comparison of these products.
If you’re a bug bounty hunter or an offensive security specialist, you might be interested in the Google Dorks for Bug Bounty website.
Enjoy the materials and stay secure!
Materials
🕵️ 4,000,000 WordPress Affected by Critical Authentication Bypass Vulnerability
Are your WordPress sites secure? A critical vulnerability affecting over 4 million installations of the Really Simple Security plugin that allowed attackers to bypass authentication and gain administrative access. The article discusses the vulnerability details, patch updates, and recommendations for site owners, making it crucial for WordPress users and developers.
🕵️ Authentication Bypass and RCE in Palo Alto PAN-OS – CVE-2024-0012 and CVE-2024-9474
What critical vulnerabilities are impacting Palo Alto Networks’ SSLVPN appliances? This article explores CVE-2024-0012 and CVE-2024-9474, which involve authentication bypass and privilege escalation. It is ideal for security professionals and network administrators looking to understand and mitigate these risks in their systems.
📄 Comparison of Enterprise SAST/DAST Products
What insights can you gain from comparing enterprise SAST and DAST products? This repository contains a sheet with a comprehensive overview of various enterprise-level SAST and DAST tools, assessing their features, capabilities, and compatibility. It’s perfect for security professionals and organizations to better understand what major vendors provide.
🛠️ Google Dorks for Bug Bounty
What are Google Dorks and how can they enhance bug bounty hunting? This website provides various Google search operators used to uncover vulnerabilities and sensitive information on target domains. It’s aimed at aspiring bug bounty hunters and cybersecurity enthusiasts looking to improve their reconnaissance skills.
📄 Understanding command injection vulnerabilities in Go
Are you a Go developer concerned about security vulnerabilities? This article dives into command injection vulnerabilities in Go, explaining what they are, how they occur, and their potential dangers. It offers best practices for mitigation, such as input validation and using safe libraries, along with solutions from Snyk for enhanced code security.
📄 How JWT Libraries Block Algorithm Confusion: Key Lessons for Code Review
Are your JWT libraries secure against algorithm confusion attacks? This article explores the vulnerabilities of JWT libraries and highlights common strategies developers employ to block these attacks. Aimed at security professionals and developers, it outlines effective coding practices to enhance security in token verification processes.
🛠️ Garak, LLM Vulnerability Scanner
How can you ensure your AI models are secure? This article introduces Garak, a vulnerability scanner designed for large language models (LLMs) that detects weaknesses such as hallucinations and prompt injections. It’s ideal for developers and AI researchers looking to enhance model security and robustness.
🕵️ Five Local Privilege Escalation Vulnerabilities in needrestart
What vulnerabilities were identified in the needrestart utility for Ubuntu Server? This article presents five Local Privilege Escalation vulnerabilities identified by Qualys, affecting numerous systems. It offers insights on potential impacts, mitigation steps, and essential updates. Ideal for IT professionals and system administrators, this advisory emphasizes quick action to safeguard system integrity.
🕵️ CVE-2024-10524 Wget Zero Day Vulnerability
In this article, readers will learn about CVE 2024 10524, a medium severity vulnerability found in GNU’s Wget that could lead to SSRF, phishing, and MiTM attacks. System administrators should update Wget to version 1.25.0 to mitigate risks.
🕵️ High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables
This guide provides a step-by-step approach for security professionals and developers to experiment with the vulnerability in PostgreSQL allowing for modifying environment variables.
👾 Malicious NPM Package Exploits WhatsApp Authentication with Remote Kill Switch
This article uncovers a malicious npm package impersonating a WhatsApp web client, executing silent data exfiltration and file destruction. It presents how important is validating utilised software to detect potentially malicious packages.