Emergency Response

Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert

December 3, 2019 | Adeline Zhang

Vulnerability Description On November 18, local time, Apache Software Foundation (ASF) released an official security bulletin to reveal a remote code execution vulnerability (CVE-2019-12409) in Apache Solr. This vulnerability exists and can bring security risks because the configuration item ENABLE_REMOTE_JMX_OPTS in the configuration file solr.in.sh is enabled by default. If you use the default configuration […]

Advisory: Apache Flink Remote Code Execution Vulnerability

December 2, 2019 | Adeline Zhang

Overview Recently, a security researcher announced a remote code execution vulnerability in Apache Flink Dashboard. The vulnerability does not require an attacker to authenticate, and a malicious Jar package can be uploaded via the dashboard to execute the code remotely. NSFOCUS researchers also made a successful re-enactment through research, confirming that they can attack the […]

Advisory: Apache Shiro RememberMe Padding Oracle Vulnerability

November 30, 2019 | Adeline Zhang

Vulnerability Description In September 2019, Apache officially released a vulnerability topic “RememberMe Padding Oracle Vulnerability” numbered SHIRO-721. The issue pointed out that because the RememberMe field of the Apache Shiro cookie is encrypted by the AES-128-CBC mode, Shiro is vulnerable to Padding Oracle attacks. An attacker can use the Legal RememberMe cookie as the Padding […]

Microsoft Released November 2019 Security Patches to Fix 13 Critical Vulnerabilities

November 29, 2019 | Adeline Zhang

Overview Among the vulnerabilities that Microsoft has updated in this month, there are 13 critical ones which exist in products like Hyper-V, VBScript, Exchange, and Scripting Engine.

Adobe Security Bulletins for November 2019 Security Updates Threat Alert

November 26, 2019 | Adeline Zhang

Overview On November 12, local time, Adobe officially released the November security update, which fixes multiple vulnerabilities in Adobe’s various products, including Adobe Bridge CC, Adobe Media Encoder, Adobe Illustrator CC, and Adobe Animate CC.

Advisory: Squid Multiple High-risk Vulnerability

November 25, 2019 | Adeline Zhang

Vulnerability Description On November 5, local time, Squid officially released a security bulletin to fix multiple vulnerabilities, including a high-risk buffer overflow vulnerability that could lead to code execution (CVE-2019-12526), ​​an information disclosure vulnerability (CVE-2019-18679) And HTTP request splitting problem (CVE-2019-18678).

Advisory: Open-Source Compression Library Libarchive Code Execution Vulnerability (CVE-2019-18408)

November 19, 2019 | Adeline Zhang

Overview Recently, a code execution vulnerability (CVE-2019-18408) was disclosed in the security update of Debian, Ubuntu, Gentoo and other distributions.

Apache Solr velocity Remote Code Execution Vulnerability Handling Guide

November 12, 2019 | Adeline Zhang

Vulnerability Description On October 30, @_S00pY disclosed the exploitation of Apache Solr Remote Code Execution Vulnerability, which allows attackers to implement remote code execution via velocity templates. After testing, the vulnerability can be successfully triggered, and no official security patch has been released.

Kibana Remote Code Execution Vulnerability (CVE-2019-7609) Threat Alert

November 5, 2019 | Adeline Zhang

Vulnerability Description In February 2019, an official announcement was made that Kibana had a remote code execution vulnerability. The Kibana version prior to 5.6.15 and 6.6.1 had a functional flaw in the Timelion visualization tool, which allowed an attacker to use Kibana to execute arbitrary code on the server. Currently PoC has been announced; Ussers […]

Cisco Aironet Access Points Unauthorized Access Vulnerability Threat Alert

November 4, 2019 | Adeline Zhang

Overview On October 17, local time, Cisco issued a security notice claiming that an unauthorized access vulnerability to Aironet Access Points (APs) was fixed. The vulnerability stems from the fact that no specific URL is filtered. An attacker can obtain the access rights of the device by constructing a malicious URL and sending it to […]