-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1469
                   MISP 2.4.142 released - security fix
                               29 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           MISP
Publisher:         MISP Project
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Read-only Data Access -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-31780  

Original Bulletin: 
   https://www.misp-project.org/2021/04/27/MISP.2.4.142.released.html

- --------------------------BEGIN INCLUDED TEXT--------------------

https://www.misp-project.org/2021/04/27/MISP.2.4.142.released.html

MISP 2.4.142 released

MISP 2.4.142 released including many new features, a security fix and a long
list of quality of life improvements.

Correlation changes

One of the most annoying bottlenecks in how we use MISP currently is caused by
low quality correlations, both in terms of usability and having a clear view on
relevant relationships among data-points. These very often come from either
sub-optimal strategies chosen on data creation/ingestion for certain types of
attributes, but very often also on edge cases.

With the current release we've included two main tools to combat this:

Correlation exclusions

We can now remove individual values from ever correlating again, so if you come
across some typical noisy values (such as empty file hashes, registry values of
000000, internal IPs recurrinly encoded by your sandbox), you can add those to
the exclusion list.

Once added, you can execute the cleaning of the existing correlations, to
retroactively execute your exclusion rules. This is a background processed task
and depending on the amount of correlations you have may take quite some time
(it took us around 30 minutes on 25M correlations), so just fire it off and
check back later whether the job has completed.

You can also comment your reason for removing an entry. In the future we plan
on publishing community maintained default exclusion lists.

Correlation exclusion in MISP

Top correlations

List the most correlating values in your instance - in order to evaluate which
the most problematic correlations are, simply have a look at the most noisy
correlations. We've had some surprising entries in our communities, so perfect
time to do some spring cleaning.

Just hit the delete button on a correlation and it will add a rule to your
correlation exclusion list - just don't forget to run the historic cleanup from
the correlation exclusion index to remove already existing correlations
matching your newly added rules.

Server sync rule management rework

MISP server sync rule management

One of the more painful aspects of managing servers has been the historically
bad UI used to manage filter rules. This has now been completely revamped, both
with a new look but familiar look and feel as well as some clever new tools to
make it more usable.

For example, when creating pull filters, your instance will now attempt to
contact the remote instance to retrieve a list of available tags, so that you
no longer have to manually enter all of the filters when creating pull rules.
The JSON rule field allowing custom filters now also uses a handy JSON parsing
text entry, allowing you to avoid potential mistakes.

New dashboard widgets

Thanks to Jeroen Pinoy, we have some new dashboard widgets meant to give you
better oversight over how your instance is being used, showing some usage
statistics as well as tools to monitor the growth of the user base of the
community.

[evolution-]

A bunch of other fixes including security fixes

We have also a security issue (CVE-2021-31780) causing a potential misalignment
of sharing groups on synced attributes, so we highly encourage everyone to
update their MISP instance.

Besides that we have introduced a long list of quality of life improvements as
well as many fixes.

Acknowledgement

We would like to thank all the contributors, reporters and users who have
helped us in the past months to improve MISP and information sharing at large.
This release includes multiple updates in misp-objects, misp-taxonomies and
misp-galaxy . The MISP galaxy includes a major update in the Ransomware galaxy
which now includes more than 1600 documented ransomware.

As always, a detailed and complete changelog is available with all the fixes,
changes and improvements.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=iD8h
-----END PGP SIGNATURE-----