The threat alert was shared in a report. It points to vulnerabilities that can be exploited by remote attackers to bypass security restrictions and execute arbitrary code or cause denial of service on the targeted systems.
(Sign up to our Technology newsletter, Today’s Cache, for insights on emerging themes at the intersection of technology, business and policy. Click here to subscribe for free.)
The vulnerabilities affecting Microsoft Edge Versions prior to 103.0.1264.71, exist in Chromium open-Source Software which is used by Microsoft Edge (Chromium-based).
The threats can be used due to, Use after free in Guest View, Use after free in PDF, Use after free in Service Worker API, Use after free in Views and Insufficient validation of untrusted input in File.
The vulnerabilities can be exploited by remote attackers by sending specially crafted requests on the targeted system. And their successful exploitation can allow an attacker to bypass security restrictions and to execute arbitrary code.
According to the report, applying available software updates should be able to fix the vulnerabilities.
CERT-In has also issued vulnerability alerts for Drupal Core
Drupal Core
Multiple vulnerabilities have been detected in Drupal Core which can allow remote attackers to execute arbitrary code, access sensitive information, and cause cross-site scripting attacks on the targeted systems.
The vulnerability, according to the report, exists because the Image module does not properly verify access to image files not stored in the standard public files directory.
The vulnerability can be exploited by sending specially crafted requests on the targeted systems and their successful exploitation can allow attackers to access sensitive information.
The Cross site scripting vulnerability in Drupal Core exists because the Media Embed frame route does not properly validate domain parameters. Successful exploitation of this vulnerability can allow an attacker to execute arbitrary HTML and script code in the user’s browser in the context of a vulnerable website.
The vulnerabilities can be fixed by applying appropriate updates mentioned in the Drupal Security Advisory.
Published - July 29, 2022 01:16 pm IST