

Cobalt Strike Malware – Active IOCs
January 3, 2025
Any Microsoft Server Can Crash Due to Unpatched Active Directory Flaw
January 3, 2025
Cobalt Strike Malware – Active IOCs
January 3, 2025
Any Microsoft Server Can Crash Due to Unpatched Active Directory Flaw
January 3, 2025Severity
High
Analysis Summary
CVE-2024-56199 CVSS:5.2
phpMyFAQ is an open source FAQ web application. Starting no later than version 3.2.10 and prior to version 4.0.2, an attacker can inject malicious HTML content into the FAQ editor at `http[:]//localhost/admin/index[.]php?action=editentry`, resulting in a complete disruption of the FAQ page's user interface. By injecting malformed HTML elements styled to cover the entire screen, an attacker can render the page unusable. This injection manipulates the page structure by introducing overlapping buttons, images, and iframes, breaking the intended layout and functionality. Exploiting this issue can lead to Denial of Service for legitimate users, damage to the user experience, and potential abuse in phishing or defacement attacks. Version 4.0.2 contains a patch for the vulnerability.
CVE-2024-56137 CVSS:6.8
MaxKB, which stands for Max Knowledge Base, is an open source knowledge base question-answering system based on a large language model and retrieval-augmented generation (RAG). Prior to version 1.9.0, a remote command execution vulnerability exists in the module of function library. The vulnerability allow privileged users to execute OS command in custom scripts. The vulnerability has been fixed in v1.9.0.
CVE-2024-56359 CVSS:8.1
grist-core is a spreadsheet hosting server. A user visiting a malicious document and clicking on a link in a HyperLink cell using a control modifier (meaning for example Ctrl+click) could have their account compromised, since the link could use the javascript: scheme and be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid clicking on HyperLink cell links using a control modifier in documents prepared by people they do not trust.
CVE-2024-56358 CVSS:8.1
grist-core is a spreadsheet hosting server. A user visiting a malicious document and previewing an attachment could have their account compromised, because JavaScript in an SVG file would be evaluated in the context of their current page. This issue has been patched in version 1.3.2. Users are advised to upgrade. Users unable to upgrade should avoid previewing attachments in documents prepared by people they do not trust.
CVE-2024-56357 CVSS:8.1
grist-core is a spreadsheet hosting server. A user visiting a malicious document or submitting a malicious form could have their account compromised, because it was possible to use the `javascript:` scheme with custom widget URLs and form redirect URLs. This issue has been patched in version 1.3.1. Users are advised to upgrade. Users unable to upgrade should avoid visiting documents or forms prepared by people they do not trust.
Impact
- Denial of Service
- Gain Access
- Cross-Site Scripting
Indicators of Compromise
CVE
- CVE-2024-56199
- CVE-2024-56137
- CVE-2024-56359
- CVE-2024-56358
- CVE-2024-56357
Affected Vendors
Affected Products
- GitHub phpMyFAQ 3.2.10 - 4.0.2
- GitHub MaxKB v1.9.0
- GitHub grist-core 1.3.2
- GitHub grist-core 1.3.1
Remediation
Refer to GitHub Website for patch, upgrade, or suggested workaround information.