Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
15 résultats taggé PHP  ✕
Hacker selling critical Roundcube webmail exploit as tech info disclosed https://www.bleepingcomputer.com/news/security/hacker-selling-critical-roundcube-webmail-exploit-as-tech-info-disclosed/
05/06/2025 19:17:07
QRCode
archive.org
thumbnail

Hackers are actively exploiting CVE-2025-49113, a critical vulnerability in the widely used Roundcube open-source webmail application that allows remote execution.
The security issue has been present in Roundcube for over a decade and impacts versions of Roundcube webmail 1.1.0 through 1.6.10. It received a patch on June 1st.

It took attackers just a couple of days to reverse engineer the fix, weaponize the vulnerability, and start selling a working exploit on at least one hacker forum.

Roundcube is one of the most popular webmail solutions as the product is included in offers from well-known hosting providers such as GoDaddy, Hostinger, Dreamhost, or OVH.
"Email armageddon"

CVE-2025-49113 is a post-authentication remote code execution (RCE) vulnerability that received a critical severity score of 9.9 out of 10 and is described as “email armageddon.”

It was discovered and reported by Kirill Firsov, the CEO of the cybersecurity company FearsOff, who decided to publish the technical details before the end of the responsible disclosure period because an exploit had become available.

bleepingcomputer EN 2025 Actively-Exploited Exploit PHP RCE Remote-Code-Execution Roundcube CVE-2025-49113
CVE-2022-31631: High-Risk PHP Vulnerability Demands Immediate Patch https://cyble.com/blog/cve-2022-31631-vulnerability-immediate-patch/
18/02/2025 15:06:54
QRCode
archive.org
thumbnail

A critical PHP vulnerability (CVE-2022-31631) could expose websites and applications to SQL injection attacks, leading to data breaches and system compromise.

cyble EN 2025 cve-2022-31631 PHP vulnerability
Hidden Backdoors Uncovered in WordPress Malware Investigation https://blog.sucuri.net/2025/02/hidden-backdoors-uncovered-in-wordpress-malware-investigation.html
16/02/2025 14:38:31
QRCode
archive.org
thumbnail

Dive into our investigation of WordPress malware and find out how mu-plugins are used to hide backdoor threats.

sucuri E*N 2025 WordPress malware backdoor plugin php mu-plugins
Multiple Vulnerabilities Discovered in PHP, Prompting Urgent Security Updates https://securityonline.info/multiple-vulnerabilities-discovered-in-php-prompting-urgent-security-updates/
02/10/2024 13:10:46
QRCode
archive.org
thumbnail

Stay updated on the latest PHP vulnerability advisory. Learn about the potential log tampering, file inclusion, and data integrity violations.

securityonline EN 2024 PHP advisory CVE-2024-9026 CVE-2024-8927 CVE-2024-8926
CVE-2024-4577 Exploits in the Wild One Day After Disclosure https://www.akamai.com/blog/security-research/2024-php-exploit-cve-one-day-after-disclosure
11/07/2024 09:04:42
QRCode
archive.org
  • The Akamai Security Intelligence Response Team (SIRT) has been monitoring activity surrounding CVE-2024-4577, a PHP vulnerability that affects installations running CGI mode that was disclosed in June 2024.

  • The vulnerability primarily affects Windows installations using Chinese and Japanese language locales, but it is possible that the vulnerability applies to a wider range of installations.

  • As early as one day after disclosure, the SIRT observed numerous exploit attempts to abuse this vulnerability, indicating high exploitability and quick adoption by threat actors.

  • The exploitations include command injection and multiple malware campaigns: Gh0st RAT, RedTail cryptominers, and XMRig.

  • Akamai App & API Protector has been automatically mitigating exploits that target our customers.

In this blog post, we’ve included a comprehensive list of indicators of compromise (IOCs) for the various exploits we discuss.

akamai EN 2024 php mass-exploitation CVE-2024-4577
Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1) https://www.ambionics.io/blog/iconv-cve-2024-2961-p1
25/06/2024 09:19:25
QRCode
archive.org
thumbnail

A few months ago, I stumbled upon a 24 years old buffer overflow in the glibc, the base library for linux programs. Despite being reachable in multiple well-known libraries or executables, it proved rarely exploitable — while it didn't provide much leeway, it required hard-to-achieve preconditions. Looking for targets lead mainly to disappointment. On PHP however, the bug shone, and proved useful in exploiting its engine in two different ways.

ambionics EN 2024 cve-2024-2961 glibc linux PHP
CVE-2024-4577 RCE in PHP CGI: Everything you need to know | Wiz Blog https://www.wiz.io/blog/critical-rce-php-cgi-vulnerability
11/06/2024 16:56:23
QRCode
archive.org
thumbnail

Detect and mitigate CVE-2024-4577, a critical remote code execution vulnerability in PHP CGI. Organizations are advised to patch urgently.

wiz EN 2024 CVE-2024-4577 PHP CGI php-cgi
Security Alert: CVE-2024-4577 - PHP CGI Argument Injection Vulnerability https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/?ref=labs.watchtowr.com
07/06/2024 13:50:51
QRCode
archive.org
thumbnail

While implementing PHP, the team did not notice the Best-Fit feature of encoding conversion within the Windows operating system. This oversight allows unauthenticated attackers to bypass the previous protection of CVE-2012-1823 by specific character sequences. Arbitrary code can be executed on remote PHP servers through the argument injection attack.

devco.re EN 2024 CVE-2024-4577 PHP CVE-2012-1823 php-cgi
No Way, PHP Strikes Again! (CVE-2024-4577) https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/
07/06/2024 13:50:05
QRCode
archive.org
thumbnail

Orange Tsai tweeted a few hours ago about “One of [his] PHP vulnerabilities, which affects XAMPP by default”, and we were curious to say the least. XAMPP is a very popular way for administrators and developers to rapidly deploy Apache, PHP, and a bunch of other tools, and any bug

watchtowr EN 2024 CVE-2024-4577 PHP windows
PHP Obfuscator with Backdoor https://www.andreadraghetti.it/php-obfuscator-with-backdoor/
30/03/2024 14:01:19
QRCode
archive.org
thumbnail

An online tool offers a service to obfuscate PHP code, but it also silently inserts a backdoor into the code that allows any other PHP code to be executed!

andreadraghetti EN 2024 php obfuscation backdoor online
Joomla: PHP Bug Introduces Multiple XSS Vulnerabilities https://www.sonarsource.com/blog/joomla-multiple-xss-vulnerabilities/
27/02/2024 18:42:43
QRCode
archive.org
thumbnail
  • Sonar’s Vulnerability Research Team has discovered an issue that led to multiple XSS vulnerabilities in the popular Content Management System Joomla.
  • The issue discovered with the help of SonarCloud affects Joomla’s core filter component and is tracked as CVE-2024-21726.
  • Attackers can leverage the issue to gain remote code execution by tricking an administrator into clicking on a malicious link.
  • The underlying PHP bug is an inconsistency in how PHP’s mbstring functions handle invalid multibyte sequences.
  • The bug was fixed with PHP versions 8.3 and 8.4, but not backported to older PHP versions.
    • Joomla released a security announcement and published version 5.0.3/4.4.3, which mitigates the vulnerability.
sonarsource EN 2024 Joomla PHP Bug CVE-2024-21726
50K WordPress sites exposed to RCE attacks by critical bug in backup plugin https://www.bleepingcomputer.com/news/security/50k-wordpress-sites-exposed-to-rce-attacks-by-critical-bug-in-backup-plugin/
12/12/2023 11:31:13
QRCode
archive.org
thumbnail

A critical severity vulnerability in a WordPress plugin with more than 90,000 installs can let attackers gain remote code execution to fully compromise vulnerable websites.

bleepingcomputer EN 2023 Backup-Migration Code-Injection CVE-2023-6553 PHP RCE Remote-Code-Execution WordPress
PHP Supply Chain Attack on Composer https://blog.sonarsource.com/php-supply-chain-attack-on-composer/
05/10/2022 22:32:46
QRCode
archive.org
thumbnail

We recently discovered a vulnerability in Composer, the main package manager for PHP, and were able to use it to take over the central repository, packagist.org.

sonarsource EN 2022 php supplychain supply-chain packagist.org
CVE-2022-35650 Analysis https://0x1337.ninja/2022/07/30/cve-2022-35650-analysis/
04/08/2022 10:38:47
QRCode
archive.org

CVE-2022-35650

The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal attacks. The capability to access this feature is only available to teachers, managers and admins by default.

Anna 0x1337 CVE-2022-35650 Analysis Moodle vulnerability PHP
PyPI package 'ctx' and PHP library 'phpass' compromised to steal environment variables https://blog.sonatype.com/pypi-package-ctx-compromised-are-you-at-risk
25/05/2022 06:59:04
QRCode
archive.org
thumbnail

This week, immensely popular PyPI package 'ctx' has been compromised and altered to steal environment variables from its users. Additionally, a forked PHP project 'phpass' also suffered a repo-hijacking attack with the project tained with identical malicious payload.

PyPI ctx PHP supplychain attack sonatype EN 2022 exfiltration steal Supply-chain-security
4461 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio