• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Vidar Malware – Active IOCs
November 12, 2021
Rewterz Threat Advisory – Multiple IBM Tivoli Key Lifecycle Manager improper
November 15, 2021

Rewterz Threat Advisory – Multiple Apache Vulnerabilities

November 15, 2021

Severity

Medium

Analysis Summary

CVE-2021-26558 

Apache ShardingSphere-UI could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data vulnerability. By sending a specially crafted request, an attacker could exploit this vulnerability to inject outer link resources and execute arbitrary code on the system.

CVE-2021-41972 

Apache Superset could allow a remote authenticated attacker to obtain sensitive information, caused by a database connections password leak for authenticated users. An attacker could exploit this vulnerability to obtain sensitive information.

CVE-2021-43350 

Apache Traffic Control could allow a remote attacker to conduct an LDAP injection, caused by an error in Traffic Ops. By sending a request with a specially-crafted username to the POST /login endpoint of any API version, an attacker could exploit this vulnerability to inject unsanitized content into the LDAP filter.

Impact

Code Execution
Information Disclosure
Remote Code Execution

Affected Vendors

Apache

Affected Products

  • Apache Traffic Server 9.1.0
  • Apache Traffic Server 5.0.0
  • Apache Traffic Server 8.0.0
  • Apache Traffic Server 8.0.8
  • Apache Traffic Server 9.0.0
  • Apache Traffic Server 8.1.2

Remediation

Upgrade to the latest version of Apache Traffic Server, available from the Apache Web site.https://trafficserver.apache.org/

  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.