{"vulnerability": "CVE-2021-3482", "sightings": [{"uuid": "9f80c8de-94d8-4969-b48f-68c7a4130da7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34823", "type": "seen", "source": "https://t.me/cibsecurity/27318", "content": "\u203c CVE-2021-34823 \u203c\n\nThe ON24 ScreenShare (aka DesktopScreenShare.app) plugin before 2.0 for macOS allows remote file access via its built-in HTTP server. This allows unauthenticated remote users to retrieve files accessible to the logged-on macOS user. When a remote user sends a crafted HTTP request to the server, it triggers a code path that will download a configuration file from a specified remote machine over HTTP. There is an XXE flaw in processing of this configuration file that allows reading local (to macOS) files and uploading them to remote machines.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-13T20:41:12.000000Z"}, {"uuid": "ddad76cb-bb7d-4b3b-94a7-17228f66991e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34824", "type": "seen", "source": "https://t.me/k8security/330", "content": "\u0421\u0435\u0433\u043e\u0434\u043d\u044f\u0448\u043d\u044f\u044f \u043d\u043e\u0432\u043e\u0441\u0442\u044c \u0431\u0443\u0434\u0435\u0442 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Istio \u0432 \u0441\u0432\u043e\u0438\u0445 Kubernetes \u0432\u043b\u0430\u0434\u0435\u043d\u0438\u044f\u0445 \u0438\u043b\u0438 \u0442\u0435\u043c, \u043a\u0442\u043e \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442 \u0430\u0443\u0434\u0438\u0442\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u043f\u043e\u043d\u044f\u0442\u043d\u043e\u0435 \u0434\u0435\u043b\u043e \u0432\u0440\u0435\u043c\u044f \u043e\u0442 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0443\u0436\u0434\u0430\u0435\u0442\u0441\u044f \u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0432\u043e \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u0435\u043c\u044b\u0445, \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445.\n\n\u0411\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u043d\u0435\u0439 \u043d\u0430\u0437\u0430\u0434 \u0431\u044b\u043b\u043e \u043e\u0431\u044a\u044f\u0432\u043b\u0435\u043d\u043e \u043e CVE-2021-34824 (\u0438\u043b\u0438 \u043f\u043e \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0439 \u043d\u0443\u043c\u0435\u0440\u0430\u0446\u0438\u0438 ISTIO-SECURITY-2021-007), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0432\u0443\u0447\u0438\u0442 \u043a\u0430\u043a: \"Istio contains a remotely exploitable vulnerability where credentials specified in the Gateway and DestinationRule credentialName field can be accessed from different namespaces.\" \u0441 CVSS Impact Score \u0440\u0430\u0432\u043d\u044b\u043c 9.1. \u0422\u0430\u043a \u0447\u0442\u043e \u043f\u0430\u0442\u0447\u0438\u043c\u0441\u044f ;)\n\n\u0410 \u0432\u043e\u043e\u0431\u0449\u0435 \u0443 Istio \u0435\u0441\u0442\u044c \u0445\u043e\u0440\u043e\u0448\u0430\u044f \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0447\u043a\u0430 \u043e \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0445 \u0432 \u043d\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 (\u043a\u0430\u043a \u0440\u0430\u0437 \u0442\u0430 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u044f\u044f \u043d\u0443\u043c\u0435\u0440\u0430\u0446\u0438\u044f) \u0438 \u0442\u0430\u043c \u043c\u043e\u0436\u043d\u043e \u043e\u0442\u043c\u0435\u0442\u0438\u0442\u044c, \u0447\u0442\u043e \u0437\u0430 2021 \u0433\u043e\u0434 \u0431\u044b\u043b\u043e \u0443\u0436\u0435 \u0437\u0430\u043a\u0440\u044b\u0442\u043e 7 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u0438\u0445 CVSS \u043d\u0435 \u043d\u0438\u0436\u0435 7.5! \u0422\u0430\u043a \u0447\u0442\u043e \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u0435 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043d\u0430 \u044d\u0442\u043e\u0442 \u043c\u043e\u043c\u0435\u043d\u0442.", "creation_timestamp": "2021-06-28T06:48:21.000000Z"}, {"uuid": "041b57c4-81e3-44ee-affc-c284e3d40a8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34825", "type": "seen", "source": "https://t.me/cibsecurity/25521", "content": "\u203c CVE-2021-34825 \u203c\n\nQuassel through 0.13.1, when --require-ssl is enabled, launches without SSL or TLS support if a usable X.509 certificate is not found on the local system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-17T18:41:06.000000Z"}]}