Disclosure date:  9/23/19

    Grav CMS v1.6.16 and possibly before are affected by numerous Cross Site Script vulnerabilities.  This vulnerability can be exploited with or without an authenticated account.  

    All things considered, this is fairly benign as far as I can tell.  There are a number of built-in protections and I think this is just a small hole that would be difficult (for me) to exploit.  That said, I like the exercise.  

    I attended a business gathering the other day and someone asked me who our ideal customer would be.  Our ideal customer is a small business owner that is concerned about cybersecurity, wants to do something about it, but doesn't know what to do. 

    The solutions we offer recognize that small businesses don't have endless dollars to throw at security.  With that in mind, I love Thinkst Canaries but $5000 for two of them immediately pushes up against that cost barrier.  As an alternative, we can use OpenCanary installed on some modest hardware and drive the cost down significantly.

    In your arsenal of goodies, canaries are useful because unlike most other devices on the network which have thresholds, canaries alert off of a single hit.  And for a good reason because there's no reasonable explanation why this box should be touched unless someone is up to no good.  

    Disclosure date:  9/23/19

    Gila CMS 1.11.3 and possibly before are affected by a Cross Site Request Forgery vulnerability due to a lack of CSRF protection.  This could lead to an attacker tricking the administrator into executing arbitrary code via a specially crafted HTML page.

    Watch your IoT devices watching you

    "What is the purpose of the IoT Inspector project?"

    "Many people use smart-home devices, also known as the Internet-of-Things (IoT), in their daily lives, ranging from bulbs, plugs, and sensors, to TVs and kitchen appliances. To a large extent, these devices enrich the lives of many users. At the same time, they may bring negative impact to their owners."

    Disclosure date:  09/12/19


    Afterlogic Aurora v8.3.9-build-a3 and possibly before are affected by a cross site scripting vulnerability that can be leveraged for session hijacking.  An attacker can exploit the XSS vulnerability, retrieve the session cookie from the administrator login, and take over the administrator account.

    Vendor notification date:  9/10/19

    Vendor has acknowledged the vulnerability and plans to address this issue in the next build.  

    See mitigation information at the bottom of this post.

    Page 7 of 45

    © 2020 sevenlayers.com