Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

December 2024

CVE-2024-47836: HTML Injection Vulnerability in Admidio User Management

On October 9, 2024, the security researchers at Astra Security found an HTML injection vulnerability in the messages section of the Admidio User Management solution. The vulnerability, assigned CVE-2024-47836, allows attackers to inject arbitrary HTML content into the application, which could manipulate webpage behavior, mislead users, and act as a precursor to further attacks.

How to Do Penetration Testing the Right Way (5 Steps)

A pentest is the process of evaluating the cyber security posture of an organization by finding all possible vulnerabilities in its infrastructure and exploiting them. A pentest uncovers security vulnerabilities across web apps, networks, apps, and humans via social engineering attack simulation.

What is API Security? Types, Challenges, Best Practices

In the rapidly changing field of software development, application programming interfaces (APIs) are very powerful tools. They allow different applications to communicate, share data, and collaborate seamlessly, constituting approximately 71% of all web traffic. However, as APIs become more essential to our applications, they also attract cyber threats. In fact, 57% of organizations reported experiencing at least one API-related data breach in the past two years.

10 Best API Security Companies To Consider in 2025

Every single day, billions of API calls happen across the internet. Behind your favorite applications, APIs work quietly to move data and connect systems. But with the growing use of APIs, API attacks didn’t just increase – they exploded. Take the Optus breach in September 2022, in which attackers exploited an unprotected API endpoint and accessed the personal data of up to 9.8 million customers, leading to a $10 million fine.

How to Conduct Web App Penetration Testing?

Web application penetration testing involves performing a simulated attack on a web app to determine weaknesses that hackers can exploit. The testing process uses emulations of real-world attacks to identify hidden attacks such as SQL injection, cross-site scripting (XSS), or cross-site request forgery (CSRF). What is the worst that could happen if you don’t continuously test your web application for vulnerabilities?

What is Continuous Threat Exposure Management (CTEM)?

Coined by Gartner in 2022, continuous threat exposure management, or CTEM is a structured framework for continuously assessing, prioritizing, validating, and remediating vulnerabilities across an organization’s attack surface, enabling you to respond effectively to the most pressing threats over an ever-expanding attack surface. Reactive security is a temporary fix, not a sustainable solution.

Stored XSS Vulnerability in Dynamic Dashboard Paragraph Widget

Product Name: Dynamic Dashboard Vulnerability: Stored XSS Vulnerable Version: >= 3.0.0, < 3.0.1 CVE: CVE-2024-47817 On October 5, 2024, the security researchers from Astra discovered a severe Stored Cross-Site Scripting vulnerability in Dynamic Dashboard’s paragraph widget. The widget, used for text and markdown, has inadequate input sanitization allowing attackers to inject malicious code.

CVE-2024-9900: Stored XSS Vulnerability in Muddler's LocalAI

Product Name: Dynamic Dashboard Vulnerability: Stored XSS Vulnerable Version: >= 3.0.0, < 3.0.1 CVE: CVE-2024-47817 Astra Security researchers identified a vulnerability in LocalAI, an Open-Source OpenAI alternative. The vulnerability, CVE-2024-9900, is a stored Cross-Site Scripting issue affecting the LocalAI v2.21.1 prompts, which allow malicious scripts and payloads to be input.