• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical vulnerabilities uncovered in open source casaos cloud software

Critical Vulnerabilities Uncovered in Open Source CasaOS Cloud Software

You are here: Home / General Cyber Security News / Critical Vulnerabilities Uncovered in Open Source CasaOS Cloud Software
October 17, 2023

Two critical security flaws uncovered in the open up-supply CasaOS own cloud software could be effectively exploited by attackers to attain arbitrary code execution and choose more than susceptible programs.

The vulnerabilities, tracked as CVE-2023-37265 and CVE-2023-37266, the two carry a CVSS score of 9.8 out of a maximum of 10.

Sonar security researcher Thomas Chauchefoin, who uncovered the bugs, claimed they “let attackers to get about authentication demands and attain full entry to the CasaOS dashboard.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Even far more troublingly, CasaOS’ support for third-party apps could be weaponized to run arbitrary commands on the program to obtain persistent accessibility to the machine or pivot into inside networks.

Adhering to responsible disclosure on July 3, 2023, the flaws have been resolved in edition .4.4 produced by its maintainers IceWhale on July 14, 2023.

A short description of the two flaws is as follows –

  • CVE-2023-37265 – Incorrect identification of the resource IP tackle, allowing unauthenticated attackers to execute arbitrary commands as root on CasaOS instances
  • CVE-2023-37265 – Unauthenticated attackers can craft arbitrary JSON Web Tokens (JWTs) and obtain attributes that involve authentication and execute arbitrary instructions as root on CasaOS instances

A consequence of profitable exploitation of the aforementioned flaws could allow for attackers to get about authentication restrictions and get administrative privileges on susceptible CasaOS situations.

Cybersecurity

“In normal, identifying IP addresses at the application layer is risk-vulnerable and should not be relied on for security choices,” Chauchefoin explained.

“Quite a few diverse headers could transport this information (X-Forwarded-For, Forwarded, and many others.), and the language APIs sometimes need to interpret nuances of the HTTP protocol the exact same way. Equally, all frameworks have their very own quirks and can be difficult to navigate devoid of skilled know-how of these common security footguns.”

Located this post attention-grabbing? Abide by us on Twitter  and LinkedIn to go through more exclusive content we post.


Some sections of this post are sourced from:
thehackernews.com

Previous Post: «webinar: locking down financial and accounting data — best data Webinar: Locking Down Financial and Accounting Data — Best Data Security Strategies
Next Post: Discord: A Playground for Nation-State Hackers Targeting Critical Infrastructure discord: a playground for nation state hackers targeting critical infrastructure»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.