• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Docushare Flaws Could Lead To Data Leakage Unless You Install

DocuShare flaws could lead to data leakage unless you install these patches

You are here: Home / General Cyber Security News / DocuShare flaws could lead to data leakage unless you install these patches

Huge Inventory

Xerox has moved to take care of two flaws in its DocuShare enterprise doc-administration system that could enable hackers to steal information from buyers. The remedy comes just after Cybersecurity and Infrastructure Security Agency (CISA) issued a security bulletin.

CISA urged end users and directors to implement a patch that fixes two bugs in lately released versions (6.6.1, 7., and 7.5) of Xerox’s DocuShare. The vulnerability is rated “Important.”

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Ultimate Suite 2021

Protect yourself against all threads using AVAST Ultimate Suite. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium. In addition it comes with AVAST's well-known VPN service SecureLineVPN. Therefore, it will be a security and privacy in one package.

Get AVAST Ultimate Suite with 65% discount certified seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In accordance to Xerox’s advisory, the bugs, tracked as CVE-2020-27177, expose people to a server-side request forgery (SSRF) attack and an unauthenticated exterior XML entity injection attack (XXE). Xerox did not share any aspects on the bugs or explain how an attacker could choose advantage of the flaws. The doc did, on the other hand, provide one-way links to up to date variations on Linux, Windows, and Solaris.

A server-facet ask for forgery (SSRF) attack is the place an attacker abuses functionality on the server to browse or update inside means. 

“The attacker can source or modify a URL which the code running on the server will read or post details to, and by diligently choosing the URLs, the attacker may possibly be ready to read through server configuration such as AWS metadata, hook up to inside solutions like HTTP enabled databases or carry out write-up requests in the direction of interior companies which are not intended to be uncovered,” according to OWASP Foundation.

An XML External Entity (XXE) is a variety of attack against an software that parses XML input. This attack might direct to confidential info disclosure, denial of company, server-aspect request forgery, port scanning from the machine’s viewpoint in which the parser is situated, and other program impacts.

Jamie Akhtar, CEO and co-founder of CyberSmart, instructed ITPro that companies can often guard on their own from the broad vast majority of cyber attacks by merely adhering to a standard established of cyber cleanliness criteria. Main between these is staying aware of the vulnerabilities that exist, then quickly updating and patching gadgets. 

“Xerox has currently produced offered patches to the security flaws in their uncovered techniques. It is now down to businesses to employ these. All those who hold off this will no question bring in the awareness of cybercriminals, who see these firms as an effortless target,” Akhtar reported.

“Unfortunately, application companies might not constantly have a ‘hotfix’ readily available for all program. In this situation, the Solaris model of DocuShare 7.5 is not however obtainable. In these scenarios, corporations need to put into action non permanent mitigation techniques until finally a everlasting answer is made available.” 


Some areas of this short article are sourced from:
www.itpro.co.uk

Previous Post: «Vmware Issues Updated Fix For Critical Esxi Flaw VMware Rolls a Fix for Formerly Critical Zero-Day Bug
Next Post: Smart Sex Toy Sales Surge Poses Security Risk Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Big Tech Bans Social Networking App
  • Lack of Funding Could Lead to “Lost Generation” of Cyber-Startups
  • Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor
  • ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform
  • DarkSide decryptor unlocks systems without ransom payment – for now
  • Researchers see links between SolarWinds Sunburst malware and Russian Turla APT group
  • Millions of Social Profiles Leaked by Chinese Data-Scrapers
  • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
  • SolarWinds Hack Potentially Linked to Turla APT
  • 10 quick tips to identifying phishing emails

Copyright © TheCyberSecurity.News, All Rights Reserved.