a potential arbitrary code execution vulnerability – which can be triggered by merely cloning a malicious repository . The security hole , CVE-2018-11235 , reportedVulnerability-related.DiscoverVulnerabilityby Etienne Stalmans , stems from a flaw in Git whereby sub-module names supplied by the .gitmodules file are not properly validated when appended to $ GIT_DIR/modules . Including `` .. / '' in a name could result in directory hopping . Post-checkout hooks could then be executed , potentially causing all manner of mayhem to ensue on the victim 's system . Another vulnerability , CVE-2018-11233 , describesVulnerability-related.DiscoverVulnerabilitya flaw in the processing of pathnames in Git on NTFS-based systems , allowing the reading of memory contents . In a change from normal programming , the vulnerability appears to be cross platform . Fear not , however , because a patch is availableVulnerability-related.PatchVulnerability. The Git team releasedVulnerability-related.PatchVulnerabilitythe update in 2.13.7 of the popular coding , collaboration and control tool and forward-ported it to versions 2.14.4 , 2.15.2 , 2.16.4 and 2.13.7 . For its part , Microsoft has urged users to download 2.17.1 ( 2 ) of Git for Windows and has blocked the malicious repositories from being pushed to Visual Studio Team Services users . The software giant has also promised a hotfix will `` shortly '' be availableVulnerability-related.PatchVulnerabilityfor its popular Visual Studio 2017 platform . Other vendors , such as Debian , have been updatingVulnerability-related.PatchVulnerabilitytheir Linux and software distributions to include the patched code and recommend that users upgradeVulnerability-related.PatchVulnerabilityto thwart ne'er-do-wells seeking to exploitVulnerability-related.DiscoverVulnerabilitythe vulnerability .
A new version of Git has been emitted to ward off attempts to exploitVulnerability-related.DiscoverVulnerabilitya potential arbitrary code execution vulnerability – which can be triggered by merely cloning a malicious repository . The security hole , CVE-2018-11235 , reportedVulnerability-related.DiscoverVulnerabilityby Etienne Stalmans , stems from a flaw in Git whereby sub-module names supplied by the .gitmodules file are not properly validated when appended to $ GIT_DIR/modules . Including `` .. / '' in a name could result in directory hopping . Post-checkout hooks could then be executed , potentially causing all manner of mayhem to ensue on the victim 's system . Another vulnerability , CVE-2018-11233 , describesVulnerability-related.DiscoverVulnerabilitya flaw in the processing of pathnames in Git on NTFS-based systems , allowing the reading of memory contents . In a change from normal programming , the vulnerability appears to be cross platform . Fear not , however , because a patch is availableVulnerability-related.PatchVulnerability. The Git team releasedVulnerability-related.PatchVulnerabilitythe update in 2.13.7 of the popular coding , collaboration and control tool and forward-ported it to versions 2.14.4 , 2.15.2 , 2.16.4 and 2.13.7 . For its part , Microsoft has urged users to download 2.17.1 ( 2 ) of Git for Windows and has blocked the malicious repositories from being pushed to Visual Studio Team Services users . The software giant has also promised a hotfix will `` shortly '' be availableVulnerability-related.PatchVulnerabilityfor its popular Visual Studio 2017 platform . Other vendors , such as Debian , have been updatingVulnerability-related.PatchVulnerabilitytheir Linux and software distributions to include the patched code and recommend that users upgradeVulnerability-related.PatchVulnerabilityto thwart ne'er-do-wells seeking to exploitVulnerability-related.DiscoverVulnerabilitythe vulnerability .
Apache Software Foundation has patchedVulnerability-related.PatchVulnerabilitya remote code execution vulnerability affectingVulnerability-related.DiscoverVulnerabilitythe Jakarta Multipart parser in Apache Struts . Administrators need to updateVulnerability-related.PatchVulnerabilitythe popular Java application framework or put workarounds in place because the vulnerability is actively being targeted in attacks . The issue affectsVulnerability-related.DiscoverVulnerabilityApache Struts versions 2.3.5 through 2.3.31 and versions 2.5 through 2.5.10 . The presence of vulnerable code is enough to expose the system to attack—the web application doesn ’ t need to implement file upload for attackers to exploitVulnerability-related.DiscoverVulnerabilitythe flaw , saidVulnerability-related.DiscoverVulnerabilityresearchers from Cisco Talos . Talos “ found a high number of exploitation events , ” said Cisco threat researcher Nick Biasini . “ With exploitation actively underway , Talos recommends immediate upgrading if possible or following the workaround referenced in the above security advisory ” . The remote code execution vulnerability ( CVE-2017-5638 ) in the Jakarta Multipart parser is the result of improper handling of the Content-Type header , Apache saidVulnerability-related.DiscoverVulnerabilityin its emergency security advisory . The header indicates the media type of the resource , such as when the client tells the server what type of data was sent as part of a POST or PUT request , or the server telling the client what type of content is being returned as part of the response . The flaw is triggered when Struts parses a malformed Content-Type HTTP header and lets attackers remotely take complete control of the system without needing any kind of authentication .
The US Postal Service says it ’ s fixedVulnerability-related.PatchVulnerabilitya security weakness on usps.com that let anyone see the personal account info of its users , including usernames and street addresses . The open vulnerability was reportedly identifiedVulnerability-related.DiscoverVulnerabilityover a year ago by an independent researcher but USPS never patchedVulnerability-related.PatchVulnerabilityit until this week , when Krebs on Security flaggedVulnerability-related.DiscoverVulnerabilitythe issue . The vulnerability included all 60 million user accounts on the website . It was caused by an authentication weakness in the site ’ s application programming interface ( API ) that allowed anyone to access a USPS database offered to businesses and advertisers to track user data and packages . The API should have verified whether an account had permissions to read user data but USPS didn ’ t have such controls in place . Users ’ personal data including emails , phone numbers , mailing campaign data were all exposedAttack.Databreachto anyone who was logged into the site . Additionally , any user could request account changes for another user , so they could potentially change another account ’ s email address and phone number , although USPS does at least send a confirmation email to confirm the changes . Since street addresses are searchable through the database , any logged-in user could see who was living at each residence and even gain the data of multiple people in the same household . Krebs notes that because of the vulnerability , “ no special hacking tools were needed to pull this data. ” USPS said in a statement to Krebs : “ Any information suggesting criminals have tried to exploitVulnerability-related.DiscoverVulnerabilitypotential vulnerabilities in our network is taken very seriously . Out of an abundance of caution , the Postal Service is further investigating to ensure that anyone who may have sought to access our systems inappropriately is pursued to the fullest extent of the law. ” A recent audit of its system in October did not turn up this vulnerability , although it did find numerous other weaknesses . We ’ ve reached out for comment on whether USPS was aware of the issue when it was initially noted over a year ago . So far , no known exploits were made through this vulnerability . In USPS ’ continued efforts to modernize and adapt to the digital age , it ’ s faced numerous cybersecurity challenges .
A group known as the Shadow Brokers publishedVulnerability-related.DiscoverVulnerabilityon Good Friday a set of confidential hacking tools used by the NSA to exploitVulnerability-related.DiscoverVulnerabilitysoftware vulnerabilities in Microsoft Windows software . According to Fortune , Microsoft announcedVulnerability-related.PatchVulnerabilityon the same day that it had patchedVulnerability-related.PatchVulnerabilitythe vulnerabilities related to the NSA leakAttack.Databreach. It was especially important that the company moved quickly since juvenile hackers — also known as script kiddies — were expected to be active over the holiday weekend while defenders were away . The threat was the latest and , according to security experts , the most damaging set of stolen documents publishedAttack.Databreachby the Shadow Brokers , which is believed to be tied to the Russian government . Experts sayVulnerability-related.DiscoverVulnerabilitythe leak , which was mostly lines of computer code , was made up of a variety of “ zero-day exploits ” that can infiltrate Windows machines and then be used for espionage , vandalism or document theft . The group also publishedAttack.Databreachanother set of documents that show that the NSA penetrated the SWIFT banking network in the Middle East . “ There appears to be at least several dozen exploits , including zero-day vulnerabilities , in this release . Some of the exploits even offer a potential ‘ God mode ’ on select Windows systems . A few of the products targeted include Lotus Notes , Lotus Domino , IIS , SMB , Windows XP , Windows 8 , Windows Server 2003 and Windows Server 2012 , ” said Cris Thomas , a strategist at Tenable Network Security . The Shadow Brokers have been threatening the U.S. government for some time but until last Friday had not released anything critical . There is speculation that this document dumpAttack.Databreachcould be retaliation by Russia ( if the hackers are indeed tied to the country ) in response to recent U.S. military actions .