-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0264
  MISP 2.4.137 released (New exclusion module for the correlation engine,
         many improvements and security vulnerabilities resolved)
                              22 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           MISP
Publisher:         MISP
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
                   Reduced Security     -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-25325 CVE-2021-25324 CVE-2021-25323
                   CVE-2021-3184  

Original Bulletin: 
   https://www.misp-project.org/2021/01/20/MISP.2.4.137.released.html

- --------------------------BEGIN INCLUDED TEXT--------------------

MISP 2.4.137 released

We have released 2.4.137, a security and bug fix release including a collection
of fixes and improvements collected over the past month.

Building tools for the security community sure has its perks - over the past
week we have received two independent security test results of two separate
organisations, revealing several vulnerabilities. The update to this version is
therefore highly recommended.

A little note on vulnerability - we always welcome organisations helping us
secure MISP and our tooling in general and would hereby like to thank everyone
taking part in the process!

Several vulnerabilities resolved

  o [CVE-2021-25324] Stored XSS via the galaxy cluster view - Discovered by
    Daniel Kubica of ESET, spol. s r.o.
  o [CVE-2021-25325] Stored XSS via the galaxy element index - Discovered by
    Daniel Kubica of ESET, spol. s r.o.
  o [CVE-2021-25323] Weak default password change request policy not requiring
    the entry of the current password - Discovered by Daniel Kubica of ESET,
    spol. s r.o.
  o [CVE-2021-3184] Reflected XSS via the set homepage button - Reported by an
    anonymous party

A long list of quality of life improvements

  o The synchronisation now compresses the data exchanged, improving the
    transfer rates during the exchange
  o Additional metrics and comparison tools for the sync connections
  o Better management of API key usage along with logging
  o A new tool that allows the exclusion of certain values from the correlation
    engine (useful to avoid having regularly observed values recurring in a
    large number of events generating too much noise)

Along with many other fixes. A special thank you to @JakubOnderka for providing
a steady stream of QoL improvements, making MISP more pleasant to use by the
day!

Acknowledgement

We would like to thank all the contributors, reporters and users who have
helped us in the past months to improve MISP and information sharing at large.
This release includes multiple updates in misp-objects, misp-taxonomies and
misp-galaxy .

As always, a detailed and complete changelog is available with all the fixes,
changes and improvements.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=uTO6
-----END PGP SIGNATURE-----