Rewterz Threat Alert – Tofsee Malware – Active IOCs
December 19, 2022Rewterz Threat Advisory – Multiple VMware vRealize Operations (vROps) Vulnerabilities
December 19, 2022Rewterz Threat Alert – Tofsee Malware – Active IOCs
December 19, 2022Rewterz Threat Advisory – Multiple VMware vRealize Operations (vROps) Vulnerabilities
December 19, 2022Severity
Medium
Analysis Summary
CVE-2022-46870 CVSS:5.4
Apache Zeppelin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2021-28655 CVSS:8.2
Apache Zeppelin could allow a remote attacker to bypass security restrictions, caused by improper input validation in the “Move folder to Trash” feature. By sending a specially-crafted request, an attacker could exploit this vulnerability to delete the arbitrary files.
Impact
- Cross-Site Scripting
- Security Bypass
Indicators Of Compromise
CVE
- CVE-2022-46870
- CVE-2021-28655
Affected Vendors
Apache
Affected Products
- Apache Zeppelin 0.8.1
- Apache Zeppelin 0.9.0
Remediation
Upgrade to the latest version of Apache Zeppelin, available from the Apache Website.