Unlock the power of automation to fortify your organization against threats! Dive into our success story with a prominent financial services giant, where Aditi's team deployed enterprise-level solutions and custom scripts in Batch, Python, Visual Basic, and PowerShell. See how we streamlined processes, reduced vulnerabilities, and ensured compliance: https://lnkd.in/g6_FypaK
Aditi Consulting’s Post
More Relevant Posts
-
What Is Cross-Site Scripting (XSS)? Types, Risks & Prevention https://lnkd.in/gNuKNhze
What Is Cross-Site Scripting (XSS)? Types, Risks & Prevention
https://www.esecurityplanet.com
To view or add a comment, sign in
-
A critical Remote Code Execution (RCE) vulnerability, CVE-2024-23897, in Jenkins could allow unauthenticated attackers to execute arbitrary code. This vulnerability impacts Jenkins versions up to 2.441 and LTS 2.426.2. Users are advised to upgrade Jenkins immediately or apply mitigation strategies to protect their systems. For a detailed guide on securing your Jenkins server, visit: https://lnkd.in/dD8QEusj
CVE-2024-23897: Mitigate Jenkins RCE Threat Now
2cyberguard.com
To view or add a comment, sign in
-
It comes with automated vulnerabilities detection, dependency management able to integrate into CICD and one key thing is such tool will reduce false positive and allow developer to spent more time in fixing the real issue👍
OWASP dep-scan
owasp.org
To view or add a comment, sign in
-
Advantech EKI-1524-CE series View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.4 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Advantech Equipment: EKI-1524-CE, EKI-1522-CE, EKI-1521-CE Vulnerabilities: Cross-Site Scripting 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to execute code in the context of the session. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Advantech serial device servers are affected: EKI-1524-CE series: versions 1.24 and prior EKI-1522-CE series: versions 1.24 and prior EKI-1521-CE series: versions 1.24 and prior 3.2 Vulnerability Overview 3.2.1 Cross-Site Scripting CWE-79 Advantech EKI-1524, EKI-1522, EKI-1521 devices through version 1.21 are affected by a stored cross-site scripting vulnerability, which can be triggered by authenticated users in the device name field of the web-interface. CVE-2023-4202 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). 3.2.2 Cross-Site Scripting CWE-79 Advantech EKI-1524, EKI-1522, EKI-1521 devices through version 1.24 are affected by a stored cross-site scripting vulnerability, which can be triggered by authenticated users in the ping tool of the web-interface. CVE-2023-4203 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: Taiwan 3.4 RESEARCHER These vulnerabilities were discovered during research by R. Haas, A. Resanovic, T. Etzenberger, M. Bineder at St. Plten UAS, supported and coordinated by CyberDanube. 4. MITIGATIONS Advantech recommends users upgrade to the latest version available (currently v1.26) as shown below: EKI-1521-CE EKI-1522-CE EKI-1524-CE CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet. Locate control system networks and remote devices behind firewalls and isolating them from business networks. When remote access is required, use more secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including I...
To view or add a comment, sign in
-
Jenkins is a leading open-source automation server for CI/CD, allowing developers to streamline the building, testing, and deployment processes. Researchers have found roughly 45,000 Jenkins instances exposed online that are vulnerable to CVE-2023-23897, a critical remote code execution (RCE) flaw for which multiple public proof-of-concept (PoC) exploits are in circulation. It is likely that malice agents are actively exploiting this vulnerability. If you haven’t patch already do so or at least put in place mediations till you can.
45k Jenkins servers exposed to RCE attacks using public exploits
bleepingcomputer.com
To view or add a comment, sign in
-
This is very insightful.
Static Application Security Testing (SAST), is a technique used for scanning a code base for vulnerabilities, bugs, code smells, code duplication, and code quality. In this video, I have described how to use Jenkins and Sonarcloud (Sonarqube) to automate SAST Scan in order to search a code base for flaws, and vulnerabilities. Enjoy! #devsecops | #jenkins | #sonarqube | #sast https://lnkd.in/g6c623Gf
Static Application Security Testing (SAST) with Jenkins and Sonarqube Integration
https://www.youtube.com/
To view or add a comment, sign in
-
ASD’s ACSC is tracking multiple vulnerabilities impacting Jenkins products which could result in Remote Code Execution and Cross-site WebSocket hijacking. CVE-2024-23897 refers to a Critical vulnerability in the command line interface command parser allowing attackers to read arbitrary files on the Jenkins controller file system, resulting in possible Remote Code Execution. CVE-2024-23898 refers to a High Severity vulnerability which enables cross-site WebSocket Hijacking in the command line interface, resulting in the potential for threat actors to execute CLI commands on the Jenkins controller. https://lnkd.in/gnfK2QE9
Multiple vulnerabilities in Jenkins products
cyber.gov.au
To view or add a comment, sign in
-
As discovery of a critical vulnerability (CVE-2024-23897) in Jenkins' built-in Command Line Interface (CLI) poses a significant security risk, allowing attackers to obtain cryptographic keys for remote arbitrary code execution. Alternatively, administrators can temporarily disable access to the Jenkins CLI. The flaw could potentially expose SSH keys, passwords, and lead to remote code execution scenarios. This emphasizes the importance of prompt updates and robust security measures in place.
Critical Jenkins Vulnerability Leads to Remote Code Execution
securityweek.com
To view or add a comment, sign in
-
Static Application Security Testing (SAST), is a technique used for scanning a code base for vulnerabilities, bugs, code smells, code duplication, and code quality. In this video, I have described how to use Jenkins and Sonarcloud (Sonarqube) to automate SAST Scan in order to search a code base for flaws, and vulnerabilities. Enjoy! #devsecops | #jenkins | #sonarqube | #sast https://lnkd.in/g6c623Gf
Static Application Security Testing (SAST) with Jenkins and Sonarqube Integration
https://www.youtube.com/
To view or add a comment, sign in
-
Hunted Labs weekly Be on the Lookout (BOLO) Alert: Increased attacks targeting Jenkins CI/CD tooling using exploits related to args4j library Background: If exploited, it could allow an attacker could read SSH keys/passwords, project secrets, source code etc. Attackers will likely target this since Jenkins is very widely used and it is a very important piece of tooling for teams using it for CI/CD purposes in their software development process. Security researchers have discovered two new exploits that allows unauthenticated attackers to read arbitrary files (CVE-2024-23897) and attackers could also leverage cross-site WebSocket hijacking (CSWSH) to execute arbitrary CLI commands (CVE-2024-23898). Cause(s): Related to an issue with args4j library allowing users to read full contents. Protect: Follow the fix descriptions listed in the link from Jenkins! What's Next: Expect to see attackers go after this pretty aggressively by trying to pick on weak targets that have poor configuration management with Jenkins assets that are internet accessible to start. Additionally, any attackers who gain initial access to a target could pivot to Jenkins assets and use this as a means proliferate a software weakness. Lastly, we expect to see one or two newer exploits/cve's to be dropped against args4j. Be sure you're following proper mitigation steps as prescribed below: #softwaresupplychain #softwaresupplychainsecurity #huntorbehunted
Jenkins Security Advisory 2024-01-24
jenkins.io
To view or add a comment, sign in
560,020 followers