CERT-In issues alerts for vulnerabilities in Google Chrome OS, TP-link router and Atlassian Bitbucket Server and Data Center

Users are recommended to update their product and firmware in order to ensure their systems are secure

September 03, 2022 12:06 pm | Updated 12:06 pm IST

CERT-In issues alerts for vulnerabilities in Google Chrome OS, TP-link router and Atlassian Bitbucket Server and Data Center

CERT-In issues alerts for vulnerabilities in Google Chrome OS, TP-link router and Atlassian Bitbucket Server and Data Center | Photo Credit: Reuters

CERT-In on Thursday released notes for high severity vulnerabilities in Google Chrome OS, and critical vulnerabilities in TP-Link router and Bitbucket Server and Data Center. The reported vulnerabilities can be used by remote attackers to target affected systems and execute arbitrary codes, compromising their security.

(Sign up to our Technology newsletter, Today’s Cache, for insights on emerging themes at the intersection of technology, business and policy. Click here to subscribe for free.)

In Google Chrome OS

Multiple vulnerabilities in Google Chrome OS LTS channel version have been reported due to use after free in Blink, browser creation, webUI, managed devices API and Chrome OS shell. 

Vulnerabilities also exist in the sign-in flow, extensions and extensions API, insufficient policy enforcement in cookies, inappropriate implementation in extensions API, heap buffer overflow in PDF and side-channel information leakage in keyboard input. 

The vulnerabilities affect most Chrome OS devices, according to Google’s security releases. They can be exploited by remote attackers by sending specially crafted requests to the targeted systems. 

Successful exploitation can allow attackers to execute arbitrary code or cause denial of services on the affected systems. 

Google has released security updates to fix the vulnerabilities and their implementation is suggested to secure vulnerable systems. 

In TP-Link router firmware 

A critical vulnerability has been reported in the firmware running on routers from TP-Link Technologies Co. Ltd., a manufacturer of computer networking products. 

The vulnerability exists due to improper bonus checking by the HTTPD daemon software that runs in the background of a web server to receive server requests and process hypertext and multimedia documents over the internet. 

The vulnerability can be exploited by authenticated remote attackers, by sending specially crafted requests. Successful exploitation could lead to attackers overflowing a buffer and executing arbitrary code on the targeted systems. 

The vulnerability has been rated critical as it can allow a remote attacker to execute code and gain access to the affected system. 

Updating to the latest version of the firmware is suggested to fix the vulnerability. 

In Bitbucket Server and Data Center

A critical vulnerability has been reported in all versions of Atlassian Bitbucket Server and Data Center between 7.0.0 and 8.3.0.

The vulnerability exists due to multiple API endpoints and can be exploited by sending a specially crafted HTTP request to execute arbitrary commands on the affected systems.

The command injection vulnerability can reportedly be exploited by remote authenticated attackers to target the Git based repository management solution. 

Atlassian on its website has stated that the vulnerability can be exploited by an attacker “with access to a public repository or with read permissions to a private Bitbucket repository”. The company also stated that cloud sites hosted by Atlassian are not affected by the vulnerability.

Updating each affected product installation to a fixed version available on Atlassian’s site is suggested to fix the vulnerability.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.