I uncovered a trivial to execute bypass of Conditional Access via Microsoft Intune - if you are using device filters, you need to read this now!

#Microsoft #Entra #Intune #ConditionalAccess #SecurityFeatureBypass #SecurityVulnerability #MSRC

https://cirriustech.co.uk/blog/outtatune-vulnerability/

OuttaTune: Bypassing Conditional Access in Microsoft Intune

Exposing how Microsoft Intune's device filtering can be trivially bypassed to evade Conditional Access controls.

CirriusTech | Serious About Tech
GitHub - GNOME/libxml2: Read-only mirror of https://gitlab.gnome.org/GNOME/libxml2

Read-only mirror of https://gitlab.gnome.org/GNOME/libxml2 - GNOME/libxml2

GitHub
Welcome to Expat! · Expat XML parser

Expat XML parser

Roundcube - Free and Open Source Webmail Software

Free and open source webmail software for the masses, written in PHP

Roundcube - Free and Open Source Webmail Software

Free and open source webmail software for the masses, written in PHP

New AI advancements bring forth new risks. Wiz Research has uncovered weaknesses in SAP AI Core, which could potentially allow unauthorised individuals to exploit the system and gain access to sensitive customer information. Fortunately, SAP has promptly addressed this issue. The findings from the research provide valuable insights. Check out the details here: https://www.wiz.io/blog/sapwned-sap-ai-vulnerabilities-ai-security #artificialintelligence #SAP #securityvulnerability
SAPwned: SAP AI vulnerabilities expose customers’ cloud environments and private AI artifacts | Wiz Blog

Wiz Research uncovers vulnerabilities in SAP AI Core, allowing malicious actors to take over the service and access customer data.

wiz.io
Welcome! - The Apache HTTP Server Project

Welcome! - The Apache HTTP Server Project

regreSSHion: Remote Code Execution in OpenSSH Server (CVE-2024-6387)

Date: July 1, 2024

CVE: CVE-2024-6387

Vulnerability Type: Race Condition

CWE: [[CWE-362]], [[CWE-665]]

Sources: Qualys

Synopsis

A critical remote code execution (RCE) vulnerability has been identified in OpenSSH's server on glibc-based Linux systems, allowing unauthenticated attackers to execute arbitrary code as root.

Issue Summary

The vulnerability, identified as CVE-2024-6387, is a regression of a previously patched issue (CVE-2006-5051) and affects OpenSSH versions from 8.5p1 to 9.8p1. It arises from a signal handler race condition in the sshd server, leading to unsafe function calls within asynchronous signal handlers.

Technical Key Findings

The flaw involves sshd's SIGALRM handler, which calls non-async-signal-safe functions like syslog(), potentially leading to a heap corruption and enabling remote code execution. The exploit requires precise timing to interrupt specific code paths, leaving the system in an inconsistent state that can be exploited.

Vulnerable Products

  • OpenSSH versions 8.5p1 to 9.8p1 on glibc-based Linux systems.

Impact Assessment

Exploitation of this vulnerability allows an attacker to execute arbitrary code as root on affected systems, potentially leading to complete system compromise.

Patches or Workaround

A fix has been implemented in OpenSSH by moving the async-signal-unsafe code to a synchronous context. Users are advised to update to the latest version or set LoginGraceTime to 0 as a temporary mitigation.

Tags

#OpenSSH #CVE-2024-6387 #RCE #RaceCondition #Linux #glibc #SecurityVulnerability #Exploit #Patch