Major Unpatched RCE flaw in Dompdf
A critical security vulnerability in dompdf, a PHP-based HTML to PDF converter has been disclosed. The vulnerability disclosed could lead to remote code execution in certain configurations. The vulnerability allows a malicious party to upload font files with a .php extension to the web server, which can then be activated by using an XSS vulnerability to inject HTML into a web page before it's rendered as a PDF
Source:
Unpatched RCE Bug in dompdf Project Affects HTML to PDF Converters | The Cyber Security News
Impact:
Upon successful exploitation of this
vulnerability could lead to remote code
execution i.e an attacker can remotely
execute malicious code on a computer
Suggestions and Recommendations:
No patch has been released for this vulnerability. A potential solution could be to prohibit the loading of custom font styles into the PDF generation process or even restrict write access to the font cache folder
Severe Vulnerability Patched in CRI-O Container Engine for Kubernetes
Recently disclosed vulnerability in the CRI-O
container engine also known as cr8escape could be
exploited by an attacker to crack out of containers
and receive root access to the host. Any
containerized infrastructure that relies on these
vulnerable container engines is affected as well,
including Kubernetes and OpenShift. By exploiting
the vulnerability, adversaries could bypass these
safeguards and set arbitrary kernel parameters to
compromise the host and get a remote control.
CVE_IDs:
-
CVE-2022-0811
Source:
cr8escape: New Vulnerability in CRI-O Container Engine (CVE-2022-0811) (crowdstrike.com)
Impact:
Successful exploitation of this flaw can lead
to arbitrary code execution.
Suggestions and Recommendations:
The fix has been released in CRI-O. We strongly recommend patching the vulnerability if you are affected by this CVE
Several vulnerabilities Found in
ClickHouse DBMS
Researchers have disclosed seven new security
vulnerabilities in an open-source database
management system solution called ClickHouse
that could be weaponized to crash the servers, leak
memory contents, and even lead to the execution of
arbitrary code.
The vulnerabilities require authentication but can be triggered by any user with read permission.
CVE_IDs:
- CVE-2021-43304
- CVE-2021- 43305
- CVE-2021-42387
- CVE-2021- 42388
- CVE-2021-42389
- CVE-2021-42390
- CVE-2021-42391
Source:
Security Vulnerabilities Found in ClickHouse Open-Source Software (jfrog.com)
Impact:
Successful exploitation of this vulnerability can crash the servers, leak memory contents, and even lead to the execution of arbitrary code.
Suggestions and Recommendations:
The fix has been released and we strongly recommend updating to the latest version of ClickHouse.
New Security Vulnerability Affects Thousands of Self-Managed GitLab Instance
Researchers have disclosed details of a now patched security vulnerability in GitLab, an open-source DevOps software, that could potentially allow a remote, unauthenticated attacker to recover user-related information. The vulnerability affects all versions of GitLab Community Edition and Enterprise Edition starting from 13.0 and all versions starting from 14.4 and prior to 14.8
As per Jake Baines’s report, the vulnerability is the result of a missing authentication check when executing certain GitLab GraphQL API queries.
CVE_IDs:
- CVE-2021-4191
Source:
New Security Vulnerability Affects Thousands of Self-Managed GitLab Instances (thehackernews.com)
Impact:
Successful exploitation of this flaw allows a
remote unauthenticated attacker to recover
user-related information
Suggestions and Recommendations:
The patch has been released for the
vulnerability. We strongly recommend users
to patch their GitLab server instances to the
latest versions