January 2024 (30)
Algovate xhs-mcp Server-Side Request Forgery Vulnerability
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in Algovate xhs-mcp 0.8.11 within the xhs_publish_content function, allowing a remote attacker to manipulate the media_paths argument and potentially access internal resources.
Apko DirFS Symlink Path Traversal Vulnerability
2 rules 1 TTPA symlink-following path traversal vulnerability exists in apko versions prior to 1.2.5 allowing a malicious .apk file to create a symbolic link pointing outside the build root and subsequently modify files on the host system.
AVideo Unauthenticated Cross-User JavaScript Execution via YPTSocket Vulnerability
2 rules 2 TTPsAVideo is vulnerable to unauthenticated cross-site scripting (XSS) due to an incomplete server-side fix for a YPTSocket `autoEvalCodeOnHTML` eval sink, allowing an attacker to bypass the fix by nesting the payload under a top-level `json` field, leading to arbitrary JavaScript execution in any logged-in user's browser session.
AWS Bedrock GuardRails Deletion Attempt
2 rules 1 TTPDetection of AWS Bedrock GuardRails deletion, which are security controls to prevent harmful AI outputs, could indicate an adversary attempting to remove safety measures after credential compromise to enable malicious model outputs.
AWS Config Service Disabling Detection
2 rules 1 TTPDetection of AWS Config Service disabling, potentially indicating an attempt to impair defenses by stopping configuration recording and delivery.
AWS GuardDuty IP Set Manipulation for Defense Impairment
2 rules 1 TTPAn attacker modifies AWS GuardDuty IP sets, potentially whitelisting malicious IPs to disable security alerts and impair defenses.
AWS Network Access Control List Created with All Open Ports
2 rulesThe analytic detects the creation of AWS Network Access Control Lists (ACLs) with all ports open to a specified CIDR by monitoring `CreateNetworkAclEntry` or `ReplaceNetworkAclEntry` actions with rules allowing all traffic, potentially leading to unauthorized network access.
AWS Network Access Control List Deletion Detected
2 rules 1 TTPDetection of AWS Network Access Control List (ACL) deletion using AWS CloudTrail logs, which can remove critical access restrictions, potentially allowing unauthorized access to cloud instances and leading to data exfiltration or further compromise.
AWS S3 Bucket Lifecycle Rule for Rapid Log Deletion
2 rules 1 TTPAn attacker modifies an AWS S3 bucket lifecycle policy to rapidly expire CloudTrail logs, hindering incident response and forensic analysis.
Axios HTTP Adapter Prototype Pollution Vulnerability
2 rules 4 TTPs 1 CVEA prototype pollution vulnerability in the Axios HTTP adapter allows an attacker to inject arbitrary HTTP headers into outgoing requests by polluting the Object prototype with specific properties, leading to potential authentication bypass and privilege escalation.
Azure Domain Federation Settings Modified
2 rules 2 TTPsAn attacker may modify Azure domain federation settings to establish persistence, escalate privileges, or gain unauthorized access to resources.
Azure PIM - Role Assignment Outside of Privileged Identity Management
2 rules 4 TTPsDetection of privilege role assignments outside of Azure Privileged Identity Management (PIM) can indicate potential attacker activity related to initial access, stealth, persistence, or privilege escalation within the Azure environment.
BidingCC BuildingAI SSRF Vulnerability (CVE-2026-7065)
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in BidingCC BuildingAI up to version 26.0.1, allowing remote attackers to manipulate the `url` argument in the `uploadRemoteFile` function of `file-storage.service.ts` to conduct SSRF attacks.
Brizy WordPress Plugin Unauthenticated Stored XSS Vulnerability
2 rules 1 TTP 1 CVEThe Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.8.11, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the form Leads page due to missing nonce verification and improper handling of file upload fields.
Budibase XSS Leads to Account Takeover via JWT Theft
2 rules 1 TTPThe `budibase:auth` cookie in Budibase is set without the `httpOnly` flag, enabling attackers with XSS to steal JWTs and gain persistent access to user accounts.
choieastsea simple-openstack-mcp OS Command Injection Vulnerability (CVE-2026-7066)
3 rules 1 TTP 1 CVEThe choieastsea simple-openstack-mcp application is vulnerable to OS command injection via the exec_openstack function in server.py, allowing remote attackers to execute arbitrary commands.
CI4MS Theme Upload Zip Slip Vulnerability
2 rules 2 TTPsA critical vulnerability exists in ci4ms Theme::upload, where improper validation of ZIP archive entry names allows authenticated users with theme creation permissions to write files to arbitrary locations, leading to remote code execution.
Code Signing Policy Modification Through Registry
2 rules 2 TTPsAttackers may modify the Windows registry to disable code signing policy, allowing the execution of unsigned or self-signed malicious code, thereby bypassing security controls and enabling defense evasion.
CodeChecker Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVEAn authentication bypass vulnerability exists in CodeChecker for certain API calls, allowing unauthenticated users to execute function calls with arbitrary arguments, potentially granting superuser permissions to an attacker.
Craft CMS Authenticated Remote Code Execution via Malicious Attached Behavior
2 rules 2 TTPsCraft CMS versions before 4.17.12 and 5.9.18 are vulnerable to authenticated remote code execution via malicious behavior injection in the field layout hydration path.
Creation or Modification of Domain Backup DPAPI Private Keys
3 rules 1 TTPDetection of creation or modification of Domain Backup private keys, which adversaries may extract from a Domain Controller (DC) to decrypt domain user master key files.
CVE-2017-3735 Vulnerability Targeting Microsoft Products
2 rules 1 TTP 1 CVECVE-2017-3735 is a vulnerability impacting Microsoft products, potentially allowing unauthorized access or code execution.
CVE-2018-0735 ECDSA Signature Generation Timing Attack
2 rules 1 TTP 1 CVECVE-2018-0735 is a timing attack vulnerability in ECDSA signature generation affecting Microsoft products, potentially allowing attackers to recover private keys.
D-Link DIR-825 Buffer Overflow Vulnerability in miniupnpd
2 rules 1 TTP 1 CVEA buffer overflow vulnerability (CVE-2026-7069) exists in the AddPortMapping function of the miniupnpd component within D-Link DIR-825 routers (up to version 3.00b32), potentially enabling attackers on the local network to execute arbitrary code.
Detect-It-Easy Path Traversal Vulnerability (CVE-2026-43616)
2 rules 1 TTP 1 CVEDetect-It-Easy versions prior to 3.21 are vulnerable to path traversal, allowing attackers to write arbitrary files to the filesystem and potentially achieve code execution by crafting malicious archive entries.
Detecting Execution from Alternate Data Streams
2 rules 1 TTPAdversaries may execute malicious code from Alternate Data Streams (ADS) on Windows to evade defenses by hiding malware within legitimate files, which this detection identifies by monitoring process execution paths and arguments.
Detecting Suspicious Scheduled Task Creation in Windows
2 rules 1 TTPThis rule detects the creation of scheduled tasks in Windows using event logs, which adversaries may use for persistence, lateral movement, or privilege escalation by creating malicious tasks.
Detection of Kali Linux Installation or Usage via Windows Subsystem for Linux (WSL)
2 rules 1 TTPAdversaries may attempt to install or use Kali Linux via Windows Subsystem for Linux (WSL) to avoid detection, potentially enabling them to perform malicious activities within a Windows environment while blending in with legitimate WSL usage.
Detection of Level RMM PowerShell Script Installer
2 rules 1 TTP 1 IOCThis brief details the detection of the Level remote management tool PowerShell installer on Windows endpoints, which can be exploited by threat actors for malicious purposes to maintain persistence and execute commands, although it's a legitimate IT tool.
Detection of Level RMM Watchdog Task Creation
2 rules 2 TTPsThe creation of the 'Level Watchdog' task, indicative of the Level remote management tool installation, is detected, highlighting the potential abuse of legitimate RMM tools for persistence and execution by threat actors on Windows systems.