End-of-Day report
Timeframe: Mittwoch 18-11-2020 18:00 - Donnerstag 19-11-2020 18:00
Handler: Stephan Richter
Co-Handler: n/a
News
Android chat app with 100 million installs exposes private messages
GO SMS Pro, an Android instant messaging application with over 100 million installs, is publicly exposing private multimedia files shared between its users.
https://www.bleepingcomputer.com/news/security/android-chat-app-with-100-million-installs-exposes-private-messages/
CodeQL: Github findet Sicherheitslücke in Corona-Warn-App-Server
Das Sicherheitsteam von Github hat eine Remote Code Execution im Server-Code der Corona-Warn-App gefunden
https://www.golem.de/news/codeql-github-findet-sicherheitsluecke-in-corona-warn-app-server-2011-152244-rss.html
Egregor-Ransomware bombardiert Nutzer mit gedruckten Lösegeldforderungen
Die Cyberkriminellen wenden die Taktik erstmals bei einem Angriff auf einen chilenischen Handelskonzern an. Sie begnügen sich nicht nur mit Office-Druckern und geben ihre Lösegeldforderung sogar auf Quittungsdruckern aus. Unklar ist, wie die Hacker dabei vorgehen.
https://www.zdnet.de/88389908/egregor-ransomware-bombardiert-nutzer-mit-gedruckten-loesegeldforderungen/
Vulnerabilities
Drupal core - Critical - Remote code execution - SA-CORE-2020-012
Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting [...]
https://www.drupal.org/sa-core-2020-012
SAML SP 2.0 Single Sign On (SSO) - SAML Service Provider - Critical - Access bypass - SA-CONTRIB-2020-038
https://www.drupal.org/sa-contrib-2020-038
Ink Filepicker - Critical - Unsupported - SA-CONTRIB-2020-037
https://www.drupal.org/sa-contrib-2020-037
Media: oEmbed - Critical - Remote Code Execution - SA-CONTRIB-2020-036
https://www.drupal.org/sa-contrib-2020-036
Examples for Developers - Critical - Remote Code Execution - SA-CONTRIB-2020-035
https://www.drupal.org/sa-contrib-2020-035
VMware SD-WAN Orchestrator updates address multiple security vulnerabilities
Multiple vulnerabilities in SD-WAN Orchestrator were privately reported to VMware. Patches and workarounds are available to remediate or workaround this vulnerability in affected VMware products. VMware-hosted SD-WAN Orchestrators have been patched for these issues.
https://www.vmware.com/security/advisories/VMSA-2020-0025.html
Security updates for Thursday
Security updates have been issued by Arch Linux (chromium and firefox), CentOS (bind, curl, fence-agents, kernel, librepo, libvirt, microcode_ctl, python, python3, qt and qt5-qtbase, resource-agents, and tomcat), Debian (drupal7, firefox-esr, jupyter-notebook, packer, python3.5, and rclone), Fedora (firefox), Mageia (firefox, nss), openSUSE (gdm, kernel-firmware, and moinmoin-wiki), Oracle (net-snmp), SUSE (libzypp, zypper), and Ubuntu (c-ares).
https://lwn.net/Articles/837767/
ICS Advisory (ICSA-20-324-03) Real Time Automation EtherNet/IP
The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution.
https://us-cert.cisa.gov/ics/advisories/icsa-20-324-03
Trend Micro Apex One: Mehrere Schwachstellen
https://www.cert-bund.de/advisoryshort/CB-K20-1136
F5 BIG-IP: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
https://www.cert-bund.de/advisoryshort/CB-K20-1140
[webapps] Nagios Log Server 2.1.7 - Persistent Cross-Site Scripting
https://www.exploit-db.com/exploits/49082
Security Advisory - Improper Buffer Operation Restrictions Vulnerability on Huawei Smartphone
http://www.huawei.com/en/psirt/security-advisories/2020/huawei-sa-20201118-01-smartphone-en
Security Advisory - Command Injection Vulnerability in Huawei FusionCompute Product
http://www.huawei.com/en/psirt/security-advisories/2020/huawei-sa-20201118-01-fusioncompute-en
Security Bulletin: TLS Protocol DHE_EXPORT Ciphers Downgrade MitM (Logjam) vulnerability in IBM Cloud Pak for Data Streams
https://www.ibm.com/blogs/psirt/security-bulletin-tls-protocol-dhe_export-ciphers-downgrade-mitm-logjam-vulnerability-in-ibm-cloud-pak-for-data-streams/
Security Bulletin: The web server or application server are configured in an insecure way in IBM Cloud Pak for Data Streams
https://www.ibm.com/blogs/psirt/security-bulletin-the-web-server-or-application-server-are-configured-in-an-insecure-way-in-ibm-cloud-pak-for-data-streams/
Security Bulletin: CVE-2020-14782 may affect IBM® SDK, Java- Technology Edition
https://www.ibm.com/blogs/psirt/security-bulletin-cve-2020-14782-may-affect-ibm-sdk-java-technology-edition/
Security Bulletin: App Connect for Manufacturing 2.0 is affected by vulnerabilities of ASN.1 parser in Bouncy Castle Crypto (aka BC Java) 1.6 (CVE-2019-17359)
https://www.ibm.com/blogs/psirt/security-bulletin-app-connect-for-manufacturing-2-0-is-affected-by-vulnerabilities-of-asn-1-parser-in-bouncy-castle-crypto-aka-bc-java-1-6-cve-2019-17359/
Security Bulletin: IBM® Db2® is vulnerable to a buffer overflow (CVE-2020-4701)
https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-is-vulnerable-to-a-buffer-overflow-cve-2020-4701/
Security Bulletin: Security vulnerability affects the Report Builder that is shipped with Jazz Reporting Service (CVE-2020-4718)
https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerability-affects-the-report-builder-that-is-shipped-with-jazz-reporting-service-cve-2020-4718/
Security Bulletin: Lucky 13 Attack Vulnerability in IBM Cloud Pak for Data Streams
https://www.ibm.com/blogs/psirt/security-bulletin-lucky-13-attack-vulnerability-in-ibm-cloud-pak-for-data-streams/
Security Bulletin: Multiple vulnerabilities may affect IBM® SDK, Java- Technology Edition
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-may-affect-ibm-sdk-java-technology-edition-4/
Security Bulletin: Vulnerability in OpenSSH affects IBM Integrated Analytics System
https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-openssh-affects-ibm-integrated-analytics-system-3/
Security Bulletin: CVE-2019-17638 jetty double-release of a byte buffer
https://www.ibm.com/blogs/psirt/security-bulletin-cve-2019-17638-jetty-double-release-of-a-byte-buffer/