Articles with tag: Advisories
POSTED BY: Charalampos Maraziaris / 08.11.2023

Weak SVG asset filtering mechanism in Squidex

CENSUS ID:CENSUS-2023-0004
CVE ID:CVE-2023-46857
Affected Products:Squidex versions prior to 7.9.0
Class:Improper Neutralization of Input During Web Page Generation (CWE-79)
References:GitHub Security Advisory
Discovered by:Charalampos Maraziaris

CENSUS has discovered a stored cross site scripting (XSS) vulnerability in the Squidex "headless" open source CMS framework. The vulnerability affects all versions of Squidex prior to 7.9.0 and enables privilege escalation affecting authenticated victim users. The Squidex development team has addressed the issue in version 7.9.0 of the software.


POSTED BY: Brian McDermott / 15.06.2023

Race condition in key creation and key rotation exposes private keys of Tang server

CENSUS ID:CENSUS-2023-0002
CVE ID:CVE-2023-1672
Affected Products:Tang versions prior to 14
Class:Insecure Inherited Permissions (CWE-277)
Discovered by:Brian McDermott

The Tang open source software is used to bind data to network presence. It is commonly used along with Clevis clients to provide for unattended LUKS decryption of server storage volumes within the realms of a network, where a trusted Tang server is situated. CENSUS identified that the Tang software in versions 11, 12 and 13 (and possibly previous versions) is vulnerable to a form of race condition, where the Tang private keys become exposed for a small time window to other users on the same host. The issue is tracked as CVE-2023-1672. Users are recommended to upgrade to Tang version 14 where the issue has been sufficiently addressed.


POSTED BY: Ioannis Christodoulakos / 16.03.2023

Reflected XSS vulnerabilities in Squidex "/squid.svg" endpoint

CENSUS ID:CENSUS-2023-0001
CVE ID:CVE-2023-24278
Affected Products:Squidex versions prior to 7.4.0
Class:Improper Neutralization of Input During Web Page Generation (CWE-79)
Discovered by:Ioannis Christodoulakos

CENSUS has discovered two reflected cross site scripting (XSS) vulnerabilities in the Squidex open source headless CMS software. The Reflected Cross Site Scripting vulnerabilities affect all versions of Squidex prior to 7.4.0 and affect both authenticated and unauthenticated victim users. The Squidex development team has addressed the issues in version 7.4.0 of the software.


POSTED BY: Angelos T. Kalaitzidis / 24.05.2022

Multiple vulnerabilities in radare2

CENSUS ID:CENSUS-2022-0001
CVE IDs:CVE-2022-0419, CVE-2021-44974, CVE-2021-44975
Affected Products:radare2 versions prior to 5.6.0
Class:NULL pointer dereference (CWE-476), Heap-based buffer overflow (CWE-122)
Discovered by:Angelos T. Kalaitzidis

CENSUS identified a number of NULL pointer dereference and Heap buffer overflow bugs in the radare2 project code. Radare2 is a popular reverse engineering framework. CENSUS has verified that release 5.6.0 of radare2 carries the appropriate fixes to remediate all of the identified issues.