Security Advisory usd AG

Security Advisory 09/2021

4. Oktober 2021

The usd HeroLabs pentesters have identified vulnerabilites in the products of the manufacturers Matrix42 and Themeco while conducting their security analyses. Specifically, this is a Stored Cross-Site Scripting and a Symlink vulnerability.

The disclosure of vulnerabilities is made in accordance with usd HeroLabs Responsible Disclosure Policy. For detailed technical information about the identified security vulnerability, please refer to our list of advisories.

About usd HeroLab Security Advisories

In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.

We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues – always in line with our Responsible Disclosure Policy.

Always in the name of our mission: “more security.”

Also interesting:

Security Advisory on Element X Android

Security Advisory on Element X Android

Our analysts at the usd HeroLab discovered during their pentests that a locally installed malicious app can cause the Android application Element X (up to version 25.04.2) to load a manipulated website. This website inherits similar permissions as the app itself and,...

Security Advisory on Element Android

Security Advisory on Element Android

The pentest professionals at usd HeroLab examined the Element application for Android during their pentests. They identified a vulnerability in the PIN protection. Under certain circumstances, the user is not logged out if he enters the wrong PIN more than the...

Security Advisory on Cubro

Security Advisory on Cubro

The pentest professionals at usd HeroLab examined Cubro EXA48200 during the execution of their projects. A vulnerability was discovered in the User Management API that could allow authenticated attackers to gain administrative privileges via a single HTTP request. The...

Categories

Categories