a wide-ranging security update to addressVulnerability-related.PatchVulnerabilitymore than 300 CVE-listed vulnerabilities in its various enterprise products . The October release covers the gamut of Oracle 's offerings , including its flagship Database , E-Business Suite , and Fusion Middleware packages . For Database , the update addressesVulnerability-related.PatchVulnerabilitya total of three flaws . Two of the vulnerabilities ( CVE-2018-3259 and CVE-2018-3299 ) can be remotely exploitedVulnerability-related.DiscoverVulnerabilitywithout authentication , while the third , CVE-2018-7489 , would require the user to have a Rapid Home Provisioning account to execute and is considered by far the least severe of the three . Oracle notedVulnerability-related.DiscoverVulnerabilitythat all three bugs only impactVulnerability-related.DiscoverVulnerabilitythe server versions of Database , user clients are not considered to be vulnerableVulnerability-related.DiscoverVulnerability. For Fusion Middleware , the update will include a total of 56 CVE-listed flaws , including 12 that are remotely exploitable with CVSS base scores of 9.8 , meaning an exploit would be fairly easy to pull off and offer near total control of the target machine . Of those 12 , five were for critical flaws in WebLogic Server . Java SE will getVulnerability-related.PatchVulnerability12 security fixes , with all but one being for remotely exploitable vulnerabilities in that platform . Oracle notesVulnerability-related.DiscoverVulnerabilitythat though the CVSS scores for the flaws are fairly high , Solaris and Linux machines running software with lower user privileges will be considered to be at a lower risk than Windows environments that typically operate with admin privileges . MySQL was the target of 38 CVE-listed bug fixes this month , through just three of those are remotely exploitable . The two most serious , CVE-2018-11776 and CVE-2018-8014 , concern remote code flaws in MySQL Enterprise Monitor . PeopleSoft will see 24 bug fixes , 21 of which can be remotely targeted and seven that would not require any user interaction . Just one of the 24 flaws was given a CVSS base score higher than 7.2. in the Oracle listing . Sun products were the subject of 19 security fixes , including two remote code execution flaws in XCP Firmware . libssh bug more like `` oh SSH… '' Once admins getVulnerability-related.PatchVulnerabilitythe Oracle patches in place , they will want to take a close look at the write-up for CVE-2018-10933 , an authentication bypass for libssh that would allow an attacker to get into a target machine by sending a `` SSH2_MSG_USERAUTH_SUCCESS '' message when it expects a `` SSH2_MSG_USERAUTH_REQUEST '' message . That means any miscreant can log in without a password or other credential . As you can imagine , this is a very bad thing . Fortunately , the bug does not affect OpenSSH – and thus does not affect the hugely widespread sshd and ssh tools – but rather applications , such as KDE and XMBC , that use libssh as a dependency .
A serious vulnerability in a widely used , and widely forked , jQuery file upload plugin may have been exploitedVulnerability-related.DiscoverVulnerabilityfor years by hackers to seize control of websites – and is only now patchedVulnerability-related.PatchVulnerability. Larry Cashdollar , a bug-hunter at Akamai , explainedVulnerability-related.DiscoverVulnerabilitylate last week how the security shortcoming , designatedVulnerability-related.DiscoverVulnerabilityCVE-2018-9206 , allows a miscreant to upload and execute arbitrary code as root on a website that uses the vulnerable code with the Apache web server . This would potentially allow an attacker to , among other things , upload and run a webshell to execute commands on the target machine to stealAttack.Databreachdata , change files , distribute malware , and so on . Cashdollar – real name , he swears – was able to trackVulnerability-related.DiscoverVulnerabilitythe flaw down to Sebastian Tschan 's open-source jQuery File Upload tool , and got the developer to fixVulnerability-related.PatchVulnerabilityit in version 9.22.1 . The flaw stems from a change to the Apache web server , from version 2.3.9 and onwards , that disabled support for .htaccess security configuration files , which left projects like jQuery File Upload open to exploitation . Additionally , Cashdollar notedVulnerability-related.DiscoverVulnerability, it is almost certain he was not the first person to come acrossVulnerability-related.DiscoverVulnerabilitythis simple vulnerability . Demonstration videos on YouTube suggest similar flaws are knownVulnerability-related.DiscoverVulnerabilityto miscreants , and have been targeted in some circles for years . `` The internet relies on many security controls every day in order to keep our systems , data , and transactions safe and secure , '' Cashdollar said . `` If one of these controls suddenly does n't exist it may put security at risk unknowingly to the users and software developers relying on them . '' So , it 's believed hackers have been quietly exploiting the bug for several years as the flaw itself is fairly trivial and also eight years old . Now that details of the vulnerability are publicVulnerability-related.DiscoverVulnerability, exploit code has been produced , for example , here , and may be handy if you wish to test whether or not your website is vulnerableVulnerability-related.DiscoverVulnerabilityto CVE-2018-9206 . In any case , loads of people now know about it , so that means more miscreants menacing and hijacking vulnerable websites .
Freelance security researcher Dan Melamed has done us all a solid . Then , he did the right thing : he reported it to Facebook . Melamed said in a blog post on Monday that he ’ d discoveredVulnerability-related.DiscoverVulnerabilitythe critical vulnerability in June . Besides findingVulnerability-related.DiscoverVulnerabilitya kill switch for any public video , he also discoveredVulnerability-related.DiscoverVulnerabilityhe could disable commenting on any video . Melamed had looked at the HTTP request that his browser sends to Facebook when he uploads a video . Using a program called Fiddler , he intercepted the request , swapped out his video ’ s ID for one belonging to a victim ’ s video , and then sent the modified request on its way to Facebook . Melamed ’ s method is simple : first , an attacker would either create a public event on Facebook or visit any existing public event . Then , they ’ d go to the event ’ s Discussion tab and create an event post by uploading a photo or video . He found that when you swap the value of the composer_unpublished_photo [ 0 ] parameter for the ID of the Facebook video you want to kill , the server will balk , putting out this error message : This content is no longer available . Error message or no error message , the video will still successfully attach itself to the created event post . When an attacker refreshes the Events Discussion page , they ’ d see that the event posting had appeared with the victim ’ s video attached . Then , it ’ s just a matter of clicking a small arrow dropdown and choosing “ Delete Post ” . A dialog box will warn that the video will also be removed from Photos and Videos . If you confirm in the dialog box that yes , you want to delete the video , Poof ! Credit where credit ’ s due , Melamed notedVulnerability-related.DiscoverVulnerabilitythat this vulnerability is similar to another video deletion bug that Indian security researcher and penetration tester Pranav Hivarekar discoveredVulnerability-related.DiscoverVulnerability, also in June 2016 . In a nutshell : whereas Hivarekar ’ s flaw had to do with attaching a victim ’ s video to a comment , Melamed discoveredVulnerability-related.DiscoverVulnerabilitya way to attach the video to an event post . Delete the bath water/event post , and that baby/video gets tossed right out with it . This one had to do with how one man could have deleted any Facebook photo album that he could see . Mark offers this digression : In Melamed ’ s attack on videos , he specifies the ID of a video he ’ s targeting specifically , but since video IDs are just numbers , he could have just guessed one and wiped out a video at random .
A generic wireless camera manufactured by a Chinese company and sold around the world under different names and brands can be easily hijacked and/or roped into a botnet . The flaw that allows this to happen is foundVulnerability-related.DiscoverVulnerabilityin a custom version of GoAhead , a lightweight embedded web server that has been fitted into the devices . This and other vulnerabilities have been foundVulnerability-related.DiscoverVulnerabilityby security researcher Pierre Kim , who tested one of the branded cameras – the Wireless IP Camera ( P2P ) WIFICAM . The extensive list of devices affected byVulnerability-related.DiscoverVulnerabilitythe flaw in the custom embedded web server can be foundVulnerability-related.DiscoverVulnerabilityhere , and includes 1250+ camera models from over 300 vendors , including D-Link , Foscam , Logitech , Netcam , and Polaroid . “ This vulnerability allows an attacker to steal credentials , ftp accounts and smtp accounts ( email ) , ” Kim notedVulnerability-related.DiscoverVulnerability. He also sharedVulnerability-related.DiscoverVulnerabilitya PoC exploit that leverages the flaw to allow an attacker to achieve root shell on the device . Other vulnerabilities presentVulnerability-related.DiscoverVulnerabilityinclude a RTSP server running on the camera ’ s TCP 10554 port , which can be accessed without authentication , allowing attackers to watch what the camera streams . There is also a “ cloud ” functionality that is on by default , through which the camera can be managed via a mobile Android app . The connection between the two is established through UDP , and will be automatically established to any app that “ asks ” if a particular camera is online . Effectively , the attacker just needs to know the serial number of the device . The established UDP tunnel can also be used by the attacker to dump the camera ’ s configuration file in cleartext , or to bruteforce credentials . “ The UDP tunnel between the attacker and the camera is established even if the attacker doesn ’ t know the credentials , ” Kim noted . “ It ’ s useful to note the tunnel bypasses NAT and firewall , allowing the attacker to reach internal cameras ( if they are connected to the Internet ) and to bruteforce credentials . Then , the attacker can just try to bruteforce credentials of the camera ” . Kim advises owners of these devices to disconnect them from the Internet . A simple search with Shodan revealedVulnerability-related.DiscoverVulnerabilitythat there are 185,000+ vulnerable cameras out there , ready to be hijacked . The vulnerabilities are not in GoAhead , but the custom version of the web server developed by the Chinese OEM vendor , so EmbedThis – the company that develops GoAhead – can do nothing to fixVulnerability-related.PatchVulnerabilitythis . Interestingly enough , SecuriTeam revealedVulnerability-related.DiscoverVulnerabilitytoday the existence of an arbitrary file content disclosureVulnerability-related.DiscoverVulnerabilityvulnerability affectingVulnerability-related.DiscoverVulnerabilityolder versions of the GoAhead web server . DiscoveredVulnerability-related.DiscoverVulnerabilityby independent security researcher Istvan Toth , the vulnerability can be triggered by sending a malformed request to the web server , and it will disclose device credentials to the attacker in clear text . “ The GoAhead web server is present on multiple embedded devices , from IP cameras to printers and other embedded devices , ” SecuriTeam explained , and urged owners to remove the device from the network , “ or at the very least not allow access to the web interface to anyone beside a very strict IP address range ”