Severe Vulnerability Patched in CRI-O Container Engine for Kubernet

Major Unpatched RCE flaw in Dompdf

A critical security vulnerability in dompdf, a PHP-based HTML to PDF converter has been disclosed. The vulnerability disclosed could lead to remote code execution in certain configurations. The vulnerability allows a malicious party to upload font files with a .php extension to the web server, which can then be activated by using an XSS vulnerability to inject HTML into a web page before it's rendered as a PDF

Source:  

Unpatched RCE Bug in dompdf Project Affects HTML to PDF Converters | The Cyber Security News

Impact:   

Upon successful exploitation of this vulnerability could lead to remote code execution i.e an attacker can remotely execute malicious code on a computer

Suggestions and Recommendations:

No patch has been released for this vulnerability. A potential solution could be to prohibit the loading of custom font styles into the PDF generation process or even restrict write access to the font cache folder

Severe Vulnerability Patched in CRI-O Container Engine for Kubernetes

Recently disclosed vulnerability in the CRI-O container engine also known as cr8escape could be exploited by an attacker to crack out of containers and receive root access to the host. Any containerized infrastructure that relies on these vulnerable container engines is affected as well, including Kubernetes and OpenShift. By exploiting the vulnerability, adversaries could bypass these safeguards and set arbitrary kernel parameters to compromise the host and get a remote control.



CVE_IDs: 

  • CVE-2022-0811

Source:  

cr8escape: New Vulnerability in CRI-O Container Engine (CVE-2022-0811) (crowdstrike.com)

Impact:   

Successful exploitation of this flaw can lead to arbitrary code execution.

Suggestions and Recommendations: 

The fix has been released in CRI-O. We strongly recommend patching the vulnerability if you are affected by this CVE

Several vulnerabilities Found in ClickHouse DBMS

Researchers have disclosed seven new security vulnerabilities in an open-source database management system solution called ClickHouse that could be weaponized to crash the servers, leak memory contents, and even lead to the execution of arbitrary code.
The vulnerabilities require authentication but can be triggered by any user with read permission.

CVE_IDs: 

  • CVE-2021-43304 
  • CVE-2021- 43305 
  • CVE-2021-42387 
  • CVE-2021- 42388 
  • CVE-2021-42389 
  • CVE-2021-42390 
  • CVE-2021-42391

Source:  

Security Vulnerabilities Found in ClickHouse Open-Source Software (jfrog.com)

Impact:  

Successful exploitation of this vulnerability can crash the servers, leak memory contents, and even lead to the execution of arbitrary code.  

Suggestions and Recommendations: 

The fix has been released and we strongly recommend updating to the latest version of ClickHouse.

New Security Vulnerability Affects Thousands of Self-Managed GitLab Instance

Researchers have disclosed details of a now patched security vulnerability in GitLab, an open-source DevOps software, that could potentially allow a remote, unauthenticated attacker to recover user-related information. The vulnerability affects all versions of GitLab Community Edition and Enterprise Edition starting from 13.0 and all versions starting from 14.4 and prior to 14.8

As per Jake Baines’s report, the vulnerability is the result of a missing authentication check when executing certain GitLab GraphQL API queries.  

CVE_IDs: 

  • CVE-2021-4191

Source:  

New Security Vulnerability Affects Thousands of Self-Managed GitLab Instances (thehackernews.com)

Impact:   

Successful exploitation of this flaw allows a remote unauthenticated attacker to recover user-related information

Suggestions and Recommendations: 

The patch has been released for the vulnerability. We strongly recommend users to patch their GitLab server instances to the latest versions





Monal Tech, Dipin Thapa 27 March, 2022
Share this post
Tags
Archive
Sign in to leave a comment

Critical Arbitrary File Overwrite Vulnerability on Linux Kernel 'Dirty Pipe