Search Results for “Mohit Kumar”


June 4, 2020
Mohit Kumar / The Hacker News

Mohit Kumar / The Hacker News  
Zoom Patched Two Critical Vulnerabilities That Could Have Allowed Attackers to Execute Malicious Code

Two critical vulnerabilities in the Zoom software could have allowed attackers to hack into the systems of group chat participants or an individual recipient remotely, researchers at Cisco Talos discovered. Both flaws are path traversal vulnerabilities that could be exploited to write or plant arbitrary files on the systems running vulnerable versions of the video conferencing software to execute malicious code. The researchers say exploitation of both flaws requires little to no interaction from targeted chat participants and can be executed just by sending specially crafted messages through the chat feature to an individual or a group. One flaw (CVE-2020-6109) resided in the way Zoom leverages GIPHY service to let its users search and exchange animated GIFs while chatting. The second flaw, a remote code execution vulnerability (CVE-2020-6110), resided in the way vulnerable versions of the Zoom application process code snippets shared through the chat. Zoom patched both critical vulnerabilities last month with the release of version 4.6.12 of its video conferencing software for Windows, macOS, or Linux computers.

May 30, 2020
Mohit Kumar / The Hacker News

Mohit Kumar / The Hacker News  
Popular Indian TikTok Imitator Mitron Contains Critical Software Vulnerability That Easily Allows Anyone to Bypass Authorization

One of the copycats of the popular short video app TikTok is an Android app called Mitron, which means “friends” in Hindi. Promoted as a homegrown Indian alternative to TikTok, Mitron gained over 5 million installations, and 250,000 5-star ratings in just 48 days after being released on the Google Play Store. However, Indian vulnerability researcher Rahul Kankrale discovered that Mitron contains a critical and easy-to-exploit software vulnerability that could let anyone bypass account authorization for any Mitron user within seconds. The flaw resides in the fact that any user can log into any targeted Mitron user profile just by knowing his or her unique user ID, which is a piece of public information available in the page source, and without entering any password. Rahul discovered that Mitron is actually a re-packaged version of the TicTic app created by a Pakistani software development company Qboxus who is selling it as a ready-to-launch clone for TikTok, musical.ly or Dubsmash like services. Aside from Mitron, 250 other developers have purchased the TicTic code. Until the flaw is patched, users should not install Mitron, or if they have already installed it, they should revoke the Google access from their profiles.

March 25, 2020
Mohit Kumar / The Hacker News

Mohit Kumar / The Hacker News  
Researcher Publishes PoC for Critical Remote Code Execution Vulnerability in Open-Source Linux Project OpenWrt

Guido Vranken from the ForAllSecure software company disclosed technical details and proof-of-concept of a critical remote code execution vulnerability affecting OpenWrt, an open-source project for embedded operating systems based on Linux. Tracked as CVE-2020-7982, the vulnerability resides in the OPKG package manager of OpenWrt that exists in the way it performs integrity checking of downloaded packages using the SHA-256 checksums embedded in the signed repository index. Affected users should upgrade their device firmware to the latest OpenWrt versions 18.06.7 and 19.07.1, which were released last month.

April 2, 2019
Mohit Kumar / The Hacker News

Mohit Kumar / The Hacker News  
Two Still-Unpatched Zero-Day Vulnerabilities In Microsoft’s Internet Explorer and Edge Browsers Can Allow Attackers to Steal Users’ Confidential Data

Two unpatched zero-day vulnerabilities, one of which affects the latest version of Microsoft Internet Explorer and another affects the latest Edge Browser, allow a remote attacker to bypass same-origin policy on victims’ web browsers and potentially steal their confidential data, security researcher James Lee discovered. Same origin policy is a security feature implemented in modern browsers that restricts a web-page or a script loaded from one origin to interact with a resource from another origin. A flaw in these browsers, called an origin validation error (CWE-346), allows JavaScript embedded in a malicious web page to gather information about other web pages the user has visited. Lee contacted Microsoft about the flaw ten months ago but the company has ignored the issues he raised so Lee released a proof-of-concept for each browser vulnerability.

April 13, 2019
Mohit Kumar / The Hacker News

Mohit Kumar / The Hacker News  
Encrypted Communications Project Matrix Suffered Massive Cyber Attack Forcing Temporary Shut-Down and User Log-Outs

Matrix, the open source project that offers a protocol for self-hosted secure and decentralized real-time communications, including instant messages, VoIP and IoT communications, suffered a massive cyber attack after unknown attackers gained access to the servers hosting its official website and data. The attackers defaced Matrix’s website and stole unencrypted private messages, password hashes, access tokens, as well as GPG keys the project maintainers used for signing packages, forcing the organization to temporarily shut down its entire infrastructure and log all users out of Matrix.org. The Matrix Project said that unknown attackers exploited a sandbox bypass vulnerability in its production infrastructure on 4th April that was running on an outdated, vulnerable version of Jenkins automation server. After being informed by ethical hacker Jaikey Sarraf of the vulnerability, Matrix removed the vulnerable Jenkins server as well as revoked the attacker’s access from its servers on April 10th.

July 15, 2019
Mohit Kumar / The Hacker News

Mohit Kumar / The Hacker News  
Instagram Pays Bug Bounty Hunter $30,000 for Finding Critical Vulnerability That Could Allow Attackers to Hack Any Instagram Account Within Ten Minutes

Facebook-owned photo-sharing service Instagram has recently patched a critical vulnerability that could have allowed hackers to compromise any account without requiring any interaction from the targeted users, Indian bug bounty hunter Laxman Muthiyah discovered. The flaw resided in the password recovery mechanism implemented by the mobile version of Instagram, the rate-limiting feature of which can be bypassed within 10 minutes by sending brute force requests from different IP addresses and sending concurrent requests to process multiple attempts simultaneously. Instagram rewarded Laxman with a $30,000 bounty under its bug bounty program for discovering the flaw.

Related: SecurityWeek, TechNadu, HOTforSecurity, Graham Cluley, Security Affairs, The Zero Hack

Tweets:@Swati_THN @gcluley


July 25, 2019
Mohit Kumar / The Hacker News

Mohit Kumar / The Hacker News  
Cyxtera-Owned U.S. Firm Immunity Is Now Selling an Exploit for BlueKeep Flaw

Cybersecurity firm Immunity released an updated version of its commercial automated vulnerability assessment and penetration testing (VAPT) tool, CANVAS 7.23, which includes a new module for the BlueKeep RDP exploit (CVE-2019-0708), producing a rare public proof-of-concept (PoC) exploit that takes advantage of the Windows RDP server vulnerability. Security researcher Kevin Beaumont, who gave BlueKeep its name, flagged the sale of the exploit. Miami, Fl-based Immunity was formerly owned by ex-NSA hacker Dave Aitel, and was sold to Cyxtera Technologies in January.

Related:  Computing.co.uk, IT Wire, Vimeo

Tweets:@immunityinc @GossitheDog @GossitheDog @campuscodi


March 6, 2020
Mohit Kumar / The Hacker News

Mohit Kumar / The Hacker News  
Critical Vulnerability in PPP Daemon Software Found in Virtually All Linux Distributions, Gives Attackers Remote Execution Capability

US-CERT issued an advisory warning users of a new dangerous 17-year-old remote code execution vulnerability affecting the PPP daemon (pppd) software that comes installed on almost all Linux based operating systems, as well as powers the firmware of many other networking devices. The flaw, found by IOActive security researcher Ilja Van Sprundel and tracked as CVE-2020-8597, is a stack buffer overflow vulnerability that exists due to a logical error in the Extensible Authentication Protocol (EAP) packet parser of the pppd software. The affected software is an implementation of Point-to-Point Protocol (PPP) that enables communication and data transfer between nodes, primarily used to establish internet links such as those over dial-up modems, DSL broadband connections, and Virtual Private Networks. Users with affected operating systems and devices are advised to apply security patches as soon as possible, or when it becomes available.

February 5, 2020
Mohit Kumar / The Hacker News

Mohit Kumar / The Hacker News  
WhatsApp Flaws Could Have Allowed Attackers to Remotely Steal Files From Desktop App Users With Specially Crafted Messages

Multiple high severity vulnerabilities in WhatsApp could have allowed remote attackers to compromise the security of billions of users in different ways, PerimeterX researcher Gal Weizman discovered. The flaws, tracked as CVE-2019-18426, could have even enabled hackers to remotely steal files from the Windows or Mac computer of a victim using the WhatsApp desktop app by merely sending a specially crafted message due to a potentially dangerous open-redirect flaw that led to persistent cross-site scripting attacks. Weizman reported these issues to the Facebook security team last year who patched the flaws, released an updated version of its desktop application, and gave Weizman $12,500 under the company’s bug bounty program.

Related: Mobile Cyber Threats | Wandera, BleepingComputer.com, Security Affairs, Mirror, TechNadu, Softpedia News, Perimeter, Big News Network, NewsBytes App, Daily Mail,Mashable, Digital Trends, The Register – Security, Graham Cluley, AppleInsider, SecurityWeek, MSPoweruser

Mobile Cyber Threats | Wandera: Newly identified remote exploit exposes WhatsApp private user data | Wandera
BleepingComputer.com: WhatsApp Bug Allowed Attackers to Access the Local File System
Security Affairs: Facebook fixed a WhatsApp bug that allowed hackers to access local file system
Mirror: WhatsApp bug discovered that could let hackers access files on your computer
TechNadu: WhatsApp Desktop Found to be Vulnerable to Code Injection Attacks
Softpedia News: WhatsApp Desktop Security Flaws Put Millions of Users at Risk
Perimeter: Critical Security Flaw Found in WhatsApp Desktop Platform Allowing Cybercriminals Read From The File System Access
Big News Network: WhatsApp bug let hackers access computers with an iOS app and a text
NewsBytes App: WhatsApp flaw could have let hackers access your PC
Daily Mail : WhatsApp vulnerability discovered which allows hackers to access PRIVATE files
Mashable: WhatsApp bug let hackers access computers with only a text message
Digital Trends : WhatsApp fixes bug that could have allowed hackers to read your desktop files
The Register – Security: Terrifying bug in WhatsApp allows hackers to steal files. So get patching all nine of you using it on the desktop
Graham Cluley: WhatsApp flaw gave hackers access to files from Windows and Macs
AppleInsider: WhatsApp client flaw allows hackers to read files stored on any device
SecurityWeek: Vulnerability in WhatsApp Desktop Exposed User Files
MSPoweruser: WhatsApp Desktop for Windows has a cross-site scripting vulnerability which allows local files to be read