Categories
Cyber Security

Squirrel Engine Bug May Let Attackers Hack Video games and Cloud Providers

squirrel game programming language

Researchers have disclosed an out-of-bounds learn vulnerability within the Squirrel programming language that may be abused by attackers to interrupt out of the sandbox restrictions and execute arbitrary code inside a SquirrelVM, thus giving a malicious actor full entry to the underlying machine.

Tracked as CVE-2021-41556, the problem happens when a sport library known as Squirrel Engine is used to execute untrusted code and impacts steady launch branches 3.x and a couple of.x of Squirrel. The vulnerability was responsibly disclosed on August 10, 2021.

Automatic GitHub Backups

Squirrel is an open-source, object-oriented programming language that is used for scripting video video games and in addition to in IoT units and distributed transaction processing platforms reminiscent of Enduro/X.

“In a real-world state of affairs, an attacker might embed a malicious Squirrel script right into a neighborhood map and distribute it by way of the trusted Steam Workshop,” researchers Simon Scannell and Niklas Breitfeld said in a report shared with The Hacker Information. “When a server proprietor downloads and installs this malicious map onto his server, the Squirrel script is executed, escapes its VM, and takes management of the server machine.”

The recognized safety flaw considerations an “out-of-bounds entry by way of index confusion” when defining Squirrel lessons that might be exploited to hijack the management move of a program and achieve full management of the Squirrel VM.

Prevent Ransomware Attacks

Whereas the problem has been addressed as a part of a code commit pushed on September 16, it is price noting that the adjustments haven’t been included in a brand new steady launch, with the final official model (v3.1) launched on March 27, 2016. Maintainers who rely on Squirrel of their initiatives are extremely really useful to use the most recent fixes by rebuilding it from supply code so as to shield towards any assaults.



Source link

Categories
Cyber Security

OnionShare: Safe communications platform utilized by whistleblowers and journalists patches information publicity bug


Charlie Osborne

05 October 2021 at 12:35 UTC

Up to date: 05 October 2021 at 12:44 UTC

Open supply software program is used to guard a sender’s id

OnionShare: Secure communications platform used by whistleblowers patches data exposure bug

A software utilized by whisteblowers and the media to securely ship data has patched two vulnerabilities that might have impacted the nameless nature of the file-sharing system.

OnionShare is an open source software throughout Home windows, macOS, and Linux techniques designed to maintain customers nameless whereas finishing up actions together with file sharing, web site internet hosting, and messaging.

The service, made obtainable via the Tor community and developed by The Intercept director of infoSec Micah Lee, is utilized by most of the people in addition to journalists and whistleblowers to protect privateness.

Read more of the latest privacy news

On October 4, IHTeam revealed a security advisory on OnionShare. The workforce performed an unbiased evaluation of the software program and uncovered two bugs, tracked as CVE-2021-41868 and CVE-2021-41867, which exist in variations of the software program previous to v.2.4.

CVE-2021-41868 was present in OnionShare’s file add mechanism. By default, OnionShare generates random usernames and passwords in Primary Auth at startup in personal mode, IHTeam says, and so importing performance ought to solely be restricted to these with the correct credentials.

Nonetheless, whereas analyzing the operate, the workforce discovered that a logic issue brought on recordsdata to be
uploaded and saved remotely earlier than an authentication examine happened.

DON’T MISS Mission accomplished: Security plugin HTTPS Everywhere to be deprecated in 2022

The second vulnerability reported by the Italian safety workforce, CVE-2021-41867, might be exploited to reveal the members of a chat session. This downside, present in OnionShare’s parameter (), allowed websocket connections from unauthenticated customers, whether or not or not they owned a Flask session cookie.

“It appears that evidently with out a legitimate session ID it was not attainable to intercept messages between customers, for the reason that system closely [relies] on the session to attach into the default room – and with out a legitimate one, messages stay undelivered to unauthenticated customers,” the disclosing researcher Simone ‘d0td0tslash’ said.

“It’s nonetheless really useful to keep away from initiating a socket.io connection with out prior validating the session cookie.”

OnionShare builders have now tackled each points and released a new version of the software program, v.2.4, on September 17.

The Day by day Swig has reached out to Lee and we are going to replace as and after we hear again.

YOU MAY ALSO LIKE Critical encryption vulnerability found in secure communications platform Matrix



Source link

Categories
Cyber Security

QNAP fixes bug that allow attackers run malicious instructions remotely

QNAP fixes bugs that let attackers run malicious code remotely

Taiwan-based network-attached storage (NAS) maker QNAP has launched safety patches for a number of vulnerabilities that would permit attackers to inject and execute malicious code and instructions remotely on susceptible NAS gadgets.

Three of the safety flaws mounted in the present day by QNAP are excessive severity stored cross-site scripting (XSS) vulnerabilities (tracked as CVE-2021-34354, CVE-2021-34356, and CVE-2021-34355) have an effect on gadgets operating unpatched Picture Station software program (releases earlier than 5.4.10, 5.7.13, or 6.0.18).

QNAP additionally patched a saved XSS Image2PDF flaw impacting gadgets operating software program variations launched earlier than Image2PDF 2.1.5.

Stored XSS attacks permit risk actors to inject malicious code remotely, completely storing it on the focused servers following profitable exploitation.

The corporate additionally addressed a command injection bug (CVE-2021-34352) affecting some QNAP end-of-life (EOL) gadgets operating the QVR IP video surveillance software program that helps attackers run arbitrary instructions.

Profitable assaults exploiting the CVE-2021-34352 flaw may result in the whole takeover of compromised NAS gadgets.

Three different QVR flaws had been also patched on Monday, as disclosed by QNAP in a safety advisory rated with a crucial severity ranking.

safe your NAS machine

On condition that QNAP NAS gadgets have been beneath a constant barrage of attacks the final couple of years, prospects ought to instantly replace each apps to the most recent obtainable releases as quickly as attainable.

To replace Picture Station or Image2PDF to the most recent model in your NAS, it’s worthwhile to undergo the following process:

  1. Log into QTS or QuTS hero as administrator.
  2. Open the App Middle, after which click on . A search field seems.
  3. Sort “Picture Station” or “Image2PDF” after which press ENTER. The applying seems within the search outcomes.
  4. Click on Replace. A affirmation message seems. Observe: The Replace button just isn’t obtainable if you’re utilizing the most recent model.
  5. Click on OK. The applying is up to date.

 To replace the QVR surveillance software program, comply with these steps:

  1. Go browsing to QVR as administrator.
  2. Go to Management Panel > System Settings > Firmware Replace.
  3. Underneath Dwell Replace, click on Verify for Replace. QVR downloads and installs the most recent obtainable replace.

QNAP warned in September 2020 of a surge in ransomware attacks encrypting recordsdata on publicly uncovered NAS storage gadgets.

As BleepingComputer reported on the time, QNAP prospects’ gadgets had been being hit by AgeLocker ransomware which was concentrating on older unpatched variations of Picture Station, an app used to add images, create albums, and think about them remotely.

QNAP additionally warned of eCh0raix ransomware attacks trying to use flaws within the Picture Station app beginning with June 2020.

Source link