Book Mark

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools
    • IP Checker
    • Byte Converter
RSS

RedHat: RHSA-2018-1877:01 Moderate: sssd and ding-libs security and bug fix

Jun23
by Ike on June 23, 2018 at 9:27 am
Posted In: Other

(Jun 19) An update for sssd and ding-libs is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

 Comment 

Best Plesk Takeaways from my first WCEU – Plesk Stories

Jun22
by Ike on June 22, 2018 at 3:27 pm
Posted In: content security policies, cross-site scripting, CSP, Events, Plesk, Plesk news and announcements, Releases, security, WCEU, Wordpress, WordPress Website Security, XSS

The innovative ideas, the spirit of the community – building bridges for a better world wide web tomorrow. WordCamp Europe 2018 Belgrade rolled around for us to refuel on the WordPress energy. And WCEU 2018 was a special one with a record-breaking 2,085 attendees and 808 livestreamers. We got inspired by thought-provoking talks, shared and met peers, all wrapped up in an amazing 3-day experience. But here are the best takeaways for me and Plesk.

Why we love contributing to the WordPress open source project

Contributor day all went down the day before WCEU took off. With 177 returning contributors and 156 newbies to the group – impressive. It was so easy to get involved that I’m not surprised at the high number of returning contributors.

And it wasn’t just me either. We also had five Pleskians on the hosting team focusing on improving security. It feels great to be contributing as a team.

But one of the best bits has to be learning how much we all improved and fixed in our different teams in just one day. Be it in CLI, TIDE, Java, Marketing. And loads of pull requests too. Good job everyone!

Learning Content Security Policies (CSPs)

Content security policies (CSPs) are a relatively new security element online. CSPs use browsers to find and mitigate attacks such as cross-site scripting (XSS), clickjacking and more code injection attacks. These come from executing malicious content in the trusted web page context.You can use CSPs to enforce HTTPS on SSl-enabled sites and only authorize truly trusted sources, blocking others. The reality is most sites don’t have CSPs in place. So let’s band together and discover more. Below is what Miriam Schwab had to say about the whole new way of securing your sites that not many know about.

How to protect ourselves and our visitors from attacks

How are web apps compromised? It can be server-side – which is what we’re mostly used to,  and the client-side, so basically – on the browser. Among the top web app threats is cross-site scripting (XSS) – when a hacker injects evil js code into your source code, that loads onto the browser.

When XSS happens, the user is the victim, more than your app. As a result, the user can experience session hijacking, cookie theft, account takeover, redirecting traffic, credentials, unwanted ads, and infections. It’s not pretty, guys. So we need to take action.

First off, use directives, which are strings specifying the type of resource, taken from a predefined list (font-srcmframe-src, for example). And source expressions – patterns describing one or more servers that resources can be downloaded from (‘non’, ‘self’, ‘unsafe-inline, and so on).

It’s not great practice to put inline JS for behavioural practices. If your site has been built with inline scripts, it’s a vulnerability. But you can have these as security – it whitelists these inline scripts.

Content-security-policy (CSP): default-src ‘self’ https : ;

Script-src ‘self’ https://www.google.analytics.com

Basically whitelisting Google Analytics and saying that this is OK to load. Unsafe inline and unsafe eval is kind of vulnerable, but it’s another way of securing. Check it:

Content-security-policy: Script-src ‘unsafe-inline’ ‘unsafe-eval’

Content-security-policy: upgrade-insecure-requests;

All our WordPress sites are migrated on HTTPS and SSL – but something may have gotten lost. So this helps you ensure that everything is loaded with HTTPS. Therefore, you’ll always have a green padlock and no mixed content.

Tools to make you CSP journey a bit easier

Google created its own tool CSP evaluator – it does give you feedback which is useful. Otherwise it tells you ‘no CSP’. Security headers by Sophos give you a kind of report. And there are also some WP plugins for security. Report URI is an amazing site that spits out a security policy for you. And Telerik fiddler has a Windows version – you just put your URL in and it tells you what you need to put as a CSP.

XSS is one of the most difficult attacks to prevent but CSP helps add an extra layer of security. I know I’ve taken a lot away from this session – hope this was useful for at least a few of you. Because stats reveal that, even though WordPress powers almost a third of the web, the number of sites with CSPs in place is still relatively low. So let’s all make the internet a safer place with CSPs.

Inspired by WCEU? So are we

You can relive the whirlwind of talks, networking, inspiration, knowledge exchange, and generally all-round brilliant WCEU experiences on WordPress TV soon! Let’s now share this one goal to make WordPress, and the web, the best it can be.

The post Best Plesk Takeaways from my first WCEU – Plesk Stories appeared first on Plesk.

└ Tags: content security policies, cross-site scripting, CSP, Events, Plesk news and announcements, security, WCEU, Wordpress, WordPress Website Security, XSS
 Comment 

Fedora 28: cobbler Security Update

Jun22
by Ike on June 22, 2018 at 10:11 am
Posted In: Other

(Jun 20) Update to 2.8.3 – Fix security issue

 Comment 

Ubuntu 3691-1: OpenJDK 7 vulnerabilities

Jun22
by Ike on June 22, 2018 at 10:06 am
Posted In: Other

(Jun 21) Several security issues were fixed in OpenJDK 7.

 Comment 

Fedora 27: timidity++ Security Update

Jun22
by Ike on June 22, 2018 at 10:03 am
Posted In: Other

(Jun 20) – Security fix for [CVE-2017-11546, CVE-2017-11547] – Fix the .desktop files so that opening a .mid file from a GUI filemanager works

 Comment 
  • Page 2,249 of 2,975
  • « First
  • «
  • 2,247
  • 2,248
  • 2,249
  • 2,250
  • 2,251
  • »
  • Last »

What’s New?

  • Fedora 41: Apptainer CVE-2025-65105 Security Fix Advisory
  • Fedora 43: Apptainer 1.4.5 Important Fix CVE-2025-65105
  • Ubuntu 18.04: USN-7907-5 Linux Kernel Important Security Flaws
  • Debian: Chromium Important DSA-6080-1 Code Exec DoS Issues
  • Fedora 42: SingularityCE Important Upgrade 4.3.5 – FEDORA-2025-54d78b9fed
  • Fedora 43: perl-Alien-Brotli Critical Security DoS Fix 2025-d93200cf16
  • Fedora 42: Wireshark 4.6.1 Critical Issue Advisory – FEDORA-2025-f810869906
  • Fedora 42: yarnpkg Command Injection Fix CVE-2025-64756 Advisory
  • Ubuntu 25.10: Linux Kernel Critical Flaws Security Patch USN-7906-3
  • Ubuntu 22.04: USN-7889-6 Linux Kernel Important Security Patch
  • Ubuntu 22.04 LTS: Linux Kernel Critical Security Issues USN-7928-3
  • Ubuntu 22.04: 7928-2 Linux Kernel FIPS Security Updates
  • Ubuntu 22.04 LTS: USN-7928-1 Linux Kernel Critical Security Issues
  • Debian: Important DoS Vulnerabilities in FFmpeg DSA-6080-1 Advisory
  • Ubuntu 20.04 LTS: USN-7922-1 Linux Kernel Important Security Issues
  • Ubuntu 24.04 LTS: Kernel Important Security Fixes USN-7921-1 CVE-2025-39946
  • Debian: firefox-esr Critical Privilege Escalation DSA-6078-1 CVE-2025-14321
  • 2026 Global Partner Program Announcement
  • Debian: pdns-recursor Critical Denial of Service Vulnerability DSA-6077-1
  • Debian: libpng1.6 Critical Info Leak & DoS Vulnerabilities DSA-6076-1
  • Fedora 43: python3-docs Update 2025-e235793f10 – Maintenance Release
  • Fedora 43: python3.14 Critical Update Addresses Quadratic Complexity Bug
  • Debian: WordPress Important XSS and Info Disclosure DSA-6075-1
  • Ubuntu 22.04 LTS: fontTools Important Path Traversal Risk CVE-2025-66034
  • Debian: webkit2gtk Critical Info Exfiltration DSA-6074-1 CVE-2025-13947

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
December 2025
M T W T F S S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

50 queries. 8.75 mb Memory usage. 0.255 seconds.