-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT External Security Bulletin Redistribution
MISP 2.4.142 released - security fix
29 April 2021
AusCERT Security Bulletin Summary
Publisher: MISP Project
Operating System: Windows
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Read-only Data Access -- Existing Account
CVE Names: CVE-2021-31780
- --------------------------BEGIN INCLUDED TEXT--------------------
MISP 2.4.142 released
MISP 2.4.142 released including many new features, a security fix and a long
list of quality of life improvements.
One of the most annoying bottlenecks in how we use MISP currently is caused by
low quality correlations, both in terms of usability and having a clear view on
relevant relationships among data-points. These very often come from either
sub-optimal strategies chosen on data creation/ingestion for certain types of
attributes, but very often also on edge cases.
With the current release we've included two main tools to combat this:
We can now remove individual values from ever correlating again, so if you come
across some typical noisy values (such as empty file hashes, registry values of
000000, internal IPs recurrinly encoded by your sandbox), you can add those to
the exclusion list.
Once added, you can execute the cleaning of the existing correlations, to
retroactively execute your exclusion rules. This is a background processed task
and depending on the amount of correlations you have may take quite some time
(it took us around 30 minutes on 25M correlations), so just fire it off and
check back later whether the job has completed.
You can also comment your reason for removing an entry. In the future we plan
on publishing community maintained default exclusion lists.
Correlation exclusion in MISP
List the most correlating values in your instance - in order to evaluate which
the most problematic correlations are, simply have a look at the most noisy
correlations. We've had some surprising entries in our communities, so perfect
time to do some spring cleaning.
Just hit the delete button on a correlation and it will add a rule to your
correlation exclusion list - just don't forget to run the historic cleanup from
the correlation exclusion index to remove already existing correlations
matching your newly added rules.
Server sync rule management rework
MISP server sync rule management
One of the more painful aspects of managing servers has been the historically
bad UI used to manage filter rules. This has now been completely revamped, both
with a new look but familiar look and feel as well as some clever new tools to
make it more usable.
For example, when creating pull filters, your instance will now attempt to
contact the remote instance to retrieve a list of available tags, so that you
no longer have to manually enter all of the filters when creating pull rules.
The JSON rule field allowing custom filters now also uses a handy JSON parsing
text entry, allowing you to avoid potential mistakes.
New dashboard widgets
Thanks to Jeroen Pinoy, we have some new dashboard widgets meant to give you
better oversight over how your instance is being used, showing some usage
statistics as well as tools to monitor the growth of the user base of the
A bunch of other fixes including security fixes
We have also a security issue (CVE-2021-31780) causing a potential misalignment
of sharing groups on synced attributes, so we highly encourage everyone to
update their MISP instance.
Besides that we have introduced a long list of quality of life improvements as
well as many fixes.
We would like to thank all the contributors, reporters and users who have
helped us in the past months to improve MISP and information sharing at large.
This release includes multiple updates in misp-objects, misp-taxonomies and
misp-galaxy . The MISP galaxy includes a major update in the Ransomware galaxy
which now includes more than 1600 documented ransomware.
As always, a detailed and complete changelog is available with all the fixes,
changes and improvements.
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to firstname.lastname@example.org
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: email@example.com
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----