Race condition in key creation and key rotation exposes private keys of Tang server
CENSUS ID: | CENSUS-2023-0002 |
CVE ID: | CVE-2023-1672 |
Affected Products: | Tang versions prior to 14 |
Class: | Insecure Inherited Permissions (CWE-277) |
Discovered by: | Brian McDermott |
The Tang open source software is used to bind data to network presence. It is commonly used along with Clevis clients to provide for unattended LUKS decryption of server storage volumes within the realms of a network, where a trusted Tang server is situated. CENSUS identified that the Tang software in versions 11, 12 and 13 (and possibly previous versions) is vulnerable to a form of race condition, where the Tang private keys become exposed for a small time window to other users on the same host. The issue is tracked as CVE-2023-1672. Users are recommended to upgrade to Tang version 14 where the issue has been sufficiently addressed.
Reflected XSS vulnerabilities in Squidex "/squid.svg" endpoint
CENSUS ID: | CENSUS-2023-0001 |
CVE ID: | CVE-2023-24278 |
Affected Products: | Squidex versions prior to 7.4.0 |
Class: | Improper Neutralization of Input During Web Page Generation (CWE-79) |
Discovered by: | Ioannis Christodoulakos |
CENSUS has discovered two reflected cross site scripting (XSS) vulnerabilities in the Squidex open source headless CMS software. The Reflected Cross Site Scripting vulnerabilities affect all versions of Squidex prior to 7.4.0 and affect both authenticated and unauthenticated victim users. The Squidex development team has addressed the issues in version 7.4.0 of the software.
Multiple vulnerabilities in radare2
CENSUS ID: | CENSUS-2022-0001 |
CVE IDs: | CVE-2022-0419, CVE-2021-44974, CVE-2021-44975 |
Affected Products: | radare2 versions prior to 5.6.0 |
Class: | NULL pointer dereference (CWE-476), Heap-based buffer overflow (CWE-122) |
Discovered by: | Angelos T. Kalaitzidis |
CENSUS identified a number of NULL pointer dereference and Heap buffer overflow bugs in the radare2 project code. Radare2 is a popular reverse engineering framework. CENSUS has verified that release 5.6.0 of radare2 carries the appropriate fixes to remediate all of the identified issues.
WhatsApp exposure of TLS 1.2 cryptographic material to third party apps
CENSUS ID: | CENSUS-2021-0002 |
CVE ID: | CVE-2021-24027 |
Affected Products: | WhatsApp Messenger for Android, versions prior to 2.21.4.18 |
Class: | Exposure of Sensitive Information to an Unauthorized Control Sphere (CWE-497) |
Discovered by: | Chariton Karamitas |
CENSUS identified that versions prior to 2.21.4.18 of WhatsApp for Android allowed third party apps to access WhatsApp TLS 1.2 cryptographic material, as this was stored in "app-specific external storage". On Android 9 and previous versions of Android, the material is exposed to any third party app that bears the READ_EXTERNAL_STORAGE or WRITE_EXTERNAL_STORAGE permission. On Android 10 a malicious app would also require the requestLegacyExternalStorage attribute to access the files. Through the installation of a malicious app, or alternatively, through the exploitation of a vulnerable app (or Android component) that resides on a WhatsApp user's mobile device, remote actors were able to control the victim user's TLS session cryptographic secrets and could thus perform Man-in-The-Middle attacks to WhatsApp communications. Research has shown that exploitation of this vulnerability can lead to remote code execution on the victim device. CENSUS strongly recommends updating WhatsApp to version 2.21.4.18 or greater. This is a serious vulnerability which could be abused for surveillance purposes.