Skip to content
Threat Feed

January 2024 (30)

high advisory

Aegra Cross-Tenant IDOR in Thread Run Creation

Aegra versions 0.9.0 through 0.9.6 are vulnerable to a cross-tenant IDOR, enabling authenticated users to execute graph runs against other users' threads, read checkpoint states, inject messages, and conceal their actions due to missing user ID validation on run creation endpoints; patched in version 0.9.7.

aegra-api +1 idor privilege-escalation credential-access defense-evasion
2r 3t
critical advisory

ArchiveBox RCE via Unvalidated Configuration Overrides

ArchiveBox versions 0.8.6rc0 and earlier are vulnerable to remote code execution (RCE) due to unvalidated configuration overrides in the AddView (/add/ endpoint) allowing arbitrary command execution.

archivebox rce vulnerability
2r 1t
high advisory

AVideo API Secret Disclosure Leads to Unauthorized Access

AVideo version 29.0 and earlier is vulnerable to unauthenticated API secret disclosure via a publicly accessible endpoint, allowing unauthorized access to protected API endpoints.

AVideo api-disclosure unauthorized-access
2r 1t
medium advisory

basic-ftp Client-Side Denial of Service via Malicious FTP Server

The basic-ftp library is vulnerable to a client-side denial of service. A malicious FTP server can send an unterminated multiline response during the initial FTP banner phase, before authentication, causing the client to buffer attacker-controlled data without limit.

basic-ftp dos ftp denial-of-service client-side
2r 1t
high threat

Cobalt Strike Command and Control Beacon Detected

This brief documents the detection of Cobalt Strike command and control activity through identifying specific domain naming conventions used by its implant beacons, indicative of network attack and exploitation campaigns.

packetbeat +2 FIN7 +2 command-and-control cobalt-strike domain-generation-algorithm
2r 2t
high advisory

Contour HTTPProxy Lua Code Injection via Cookie Path Rewrite

Contour's Cookie Rewriting feature is vulnerable to Lua code injection; an attacker with RBAC permissions to create or modify HTTPProxy resources can craft a malicious value in the `spec.routes[].cookieRewritePolicies[].pathRewrite.value` or `spec.routes[].services[].cookieRewritePolicies[].pathRewrite.value` fields, resulting in arbitrary code execution in the Envoy proxy.

Contour lua code-injection httpproxy cve-2026-41246
2r 3t
medium advisory

Granian WebSocket Subprotocol Header Denial of Service

Granian versions 1.2.0 through 2.7.3 are vulnerable to an unauthenticated denial of service. Sending a WebSocket upgrade request with a `Sec-WebSocket-Protocol` header containing non-ASCII bytes causes a worker process to abort, leading to a denial of service.

granian denial-of-service websocket
2r 1t
critical threat

Grav CMS Multiple RCE Vulnerabilities

Multiple critical and high severity remote code execution vulnerabilities exist in Grav CMS due to unsafe unserialize functions, command injection in git clone, and an SSTI blocklist bypass, impacting versions prior to 2.0.0-beta.2.

Grav CMS +1 rce unserialize command-injection ssti
3r 2t
critical advisory

Grav Form Plugin Anonymous Page Content Overwrite Vulnerability

Grav Form plugin versions before 9.1.0 allow unauthenticated users to overwrite page content by uploading a malicious markdown file, leading to potential privilege escalation by crafting a new super-admin user.

grav-plugin-form grav cms file-upload privilege-escalation content-overwrite
2r 2t
medium advisory

Linux Log Clearing Attempts via Common Utilities

Adversaries attempt to clear Linux system logs using utilities like rm, rmdir, shred, and unlink to conceal malicious activity and evade detection.

defense-evasion log-clearing linux
3r 1t
high advisory

liyupi yu-picture SQL Injection Vulnerability (CVE-2026-7060)

A SQL injection vulnerability (CVE-2026-7060) exists in liyupi yu-picture versions up to a053632c41340152bf75b66b3c543d129123d8ec, allowing a remote attacker to execute arbitrary SQL commands by manipulating the sortField argument in the PageRequest function of PictureServiceImpl.java.

yu-picture sql-injection cve-2026-7060 web-application
2r 1t 1c
medium advisory

LSASS Process Access via Windows API

Detection of access attempts to the LSASS handle, indicating potential credential dumping by monitoring API calls (OpenProcess, OpenThread, ReadProcessMemory) targeting lsass.exe.

Microsoft Defender XDR +1 credential-access lsass windows
2r 2t
critical advisory

MagicMirror² Unauthenticated SSRF Vulnerability

An unauthenticated Server-Side Request Forgery (SSRF) vulnerability in MagicMirror² allows remote attackers to force the server to perform arbitrary HTTP requests, exfiltrate environment variables, and potentially compromise cloud instances or internal networks.

magicmirror ssrf cve-2026-42281
2r 2t
medium advisory

MSBuild Making Network Connections Indicating Potential Defense Evasion

MsBuild.exe making outbound network connections may indicate adversarial activity as attackers leverage MsBuild to execute code and evade detection.

MSBuild defense-evasion command-and-control
2r 2t
critical advisory

Network-AI Unauthenticated Access to MCP HTTP Endpoint

Network-AI is vulnerable to missing authentication on the MCP HTTP endpoint, allowing unauthenticated privileged tool calls that could lead to configuration changes and agent manipulation.

Network-AI cwe-306 authentication-bypass
2r 1t 2i
low advisory

Okta Group Lifecycle Change Spike Indicating Privilege Escalation

A machine learning job has identified an unusual spike in Okta group lifecycle change events, indicating potential privilege escalation activity, where adversaries may be altering group structures to escalate privileges, maintain persistence, or facilitate lateral movement within an organization’s identity management system.

privileged-access okta group-lifecycle
2r 4t
high advisory

OpenClaw MCP Loopback Token Spoofing Vulnerability

A vulnerability in OpenClaw versions 2026.4.21 and earlier allows a non-owner loopback client to spoof the owner context by manipulating request headers, potentially gaining unauthorized access to owner-gated operations.

openclaw vulnerability npm token spoofing
2r 1t
critical advisory

OpenMage LTS Weak API Session ID Vulnerability Leads to Session Hijacking

OpenMage LTS version 20.16.0 and earlier has a critical vulnerability in the XML-RPC/SOAP API session ID generation, which uses a predictable MD5 hash of time-derived inputs, allowing attackers to brute-force and hijack active API sessions for data exfiltration, order fraud, and supply chain manipulation.

magento-lts session hijacking API vulnerability brute-force attack
2r 1t 1i
medium advisory

Persistence via Scheduled Job Creation

This detection rule identifies attempts to establish persistence on Windows systems by creating scheduled jobs in the Windows Tasks directory, excluding known legitimate jobs.

Microsoft Defender XDR +5 persistence windows
2r 1t
critical advisory

phpMyFAQ Unauthenticated SQL Injection via User-Agent Header

Unauthenticated SQL injection vulnerability exists in phpMyFAQ <= 4.1.1 due to improper handling of the User-Agent header in BuiltinCaptcha, allowing attackers to inject malicious SQL payloads and potentially gain complete control of the datastore.

phpMyFAQ sql-injection unauthenticated web-application
2r 1t
medium advisory

Potential Reverse Shell via Java on Linux

The execution of a Linux shell process from a Java JAR application following an incoming network connection may indicate reverse shell activity.

Elastic Defend reverse-shell java linux execution
2r 2t
high advisory

Kaggle-MCP Path Traversal Vulnerability in prepare_kaggle_dataset Function

A path traversal vulnerability exists in the prepare_kaggle_dataset function of kaggle-mcp up to version 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d, allowing remote attackers to access arbitrary files by manipulating the competition_id argument.

kaggle-mcp path-traversal web-application cve
2r 1t 1c
high advisory

Kiota RedirectHandler Leaks Sensitive Headers on Cross-Origin Redirects

The RedirectHandler middleware in multiple Kiota libraries fails to strip sensitive HTTP headers (Cookie, Proxy-Authorization, and custom headers) when following 3xx redirects to a different host or scheme, potentially leading to session hijacking, corporate proxy credential theft, and API key theft.

kiota-java +8 header-injection credential-access cloud
3r 1t
medium advisory

MSBuild Making Network Connections

Detection of MsBuild.exe making outbound network connections which may indicate adversarial activity used to execute code and evade detection.

MSBuild defense-evasion windows
2r 2t
high advisory

Potential LSASS Clone Creation via PssCaptureSnapShot

Detection of LSASS process cloning using PssCaptureSnapShot, where the parent process is also LSASS, indicating a potential attempt to dump LSASS memory for credential access.

credential-access lsass process-injection
2r 1t
high advisory

Potential Malicious PowerShell Based on Alert Correlation

This rule identifies PowerShell script blocks linked to multiple distinct PowerShell detections via the same ScriptBlock ID, indicating compound suspicious behavior associated with chained obfuscation, decoding, and execution within a single script block.

powershell malware execution
2r 1t
medium advisory

Potential Timestomping of Executable Files on Windows

This rule identifies potential timestomping behavior on Windows systems where the creation time of executable files in sensitive system directories is modified, potentially to blend malicious executables with legitimate system files and evade detection.

Windows defense-evasion timestomp
2r 1t
medium advisory

PowerShell Script Block Logging Disabled via Registry Modification

Attackers may disable PowerShell Script Block Logging by modifying the registry to conceal their activities on the host and evade detection by setting the `EnableScriptBlockLogging` registry value to 0, impacting security monitoring and incident response capabilities.

Defender XDR +2 defense-evasion powershell registry
2r 2t
medium advisory

Suspicious WerFault Child Process Abuse

This rule detects suspicious child processes of WerFault.exe, a Windows error reporting tool, indicating potential abuse of the SilentProcessExit registry key to execute malicious processes stealthily for defense evasion, persistence, and privilege escalation.

Microsoft Defender XDR +2 defense-evasion persistence privilege-escalation masquerading
2r 3t
low advisory

Unusual Source IP for Okta Privileged Operations Detected

A machine learning job has identified a user performing privileged operations in Okta from an uncommon source IP, indicating potential privileged access activity indicative of account compromise or privilege escalation.

privileged-access okta machine-learning
2r 3t