Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-29349PUBLISHED: 2022-05-25kkFileView v4.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the url parameter at /controller/OnlinePreviewController.java.
CVE-2022-29358PUBLISHED: 2022-05-25epub2txt2 v2.04 was discovered to contain an integer overflow via the function bug in _parse_special_tag at sxmlc.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted XML file.
CVE-2022-29359PUBLISHED: 2022-05-25A stored cross-site scripting (XSS) vulnerability in /scas/?page=clubs/application_form&id=7 of School Club Application System v0.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter.
CVE-2022-29361PUBLISHED: 2022-05-25Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body.
CVE-2022-29362PUBLISHED: 2022-05-25A cross-site scripting (XSS) vulnerability in /navigation/create?ParentID=%23 of ZKEACMS v3.5.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ParentID parameter.
User Rank: Ninja
4/15/2021 | 5:48:17 PM
In addition, all ports (if web-server) should be blocked, except port 443 or 80 in some respects (Windows firewall can do that but there are ofcourse better options - PaloAlto is a good one that we use), not sure why the execution policy (if configured properly) would even allow remove exploits like this to penetrate the initial defenses).
netsh advfirewall firewall add rule name="Require Encryption for Inbound TCP/80" protocol=TCP dir=in localport=80 security=authdynenc action=allow
I would also go to "taskschd.msc" and look at the "Task Scheduler Library" to ensure there are no running "PS" scripts. The user can create a script to run to ensure the setting is always set to "Restricted"
This ensures the system is set to restrict executionpolicy or set it to Restricted.
Also, Windows 10 uses Windows Defender Security Center to protect against these types of Attacks, this could have been overlookewell, lessons learned.
Todd