mirror of https://github.com/MISP/misp-website
chg: [blog] links fixed
parent
b394cb3b8b
commit
29c52f08ac
|
@ -12,7 +12,7 @@ A new version of MISP ([2.4.110](https://github.com/MISP/MISP/tree/v2.4.110)) ha
|
|||
|
||||
## MISP modules extended to support the full MISP standard format
|
||||
|
||||
[misp-modules](misp-modules) now support MISP objects and relationships. The revamped system is still compatible with the old modules, whilst the new modules bolster up the complete MISP standard format. New modules such as [url-haus](https://github.com/MISP/misp-modules/blob/52dadd2df32b19241fdd978e50b717f1967e264b/misp_modules/modules/expansion/urlhaus.py), [joe sandbox query](https://github.com/MISP/misp-modules/blob/be61613da4f5dc8f082a7c1a9e1ec07fdb872560/misp_modules/modules/expansion/joesandbox_query.py) and many others support the new MISP standard format. This new feature allows module developers to create more advanced modules, generating MISP objects and associated relationships from any type of expansion, import or export modules in one click.
|
||||
[misp-modules](https://github.com/MISP/misp-modules) now support MISP objects and relationships. The revamped system is still compatible with the old modules, whilst the new modules bolster up the complete MISP standard format. New modules such as [url-haus](https://github.com/MISP/misp-modules/blob/52dadd2df32b19241fdd978e50b717f1967e264b/misp_modules/modules/expansion/urlhaus.py), [joe sandbox query](https://github.com/MISP/misp-modules/blob/be61613da4f5dc8f082a7c1a9e1ec07fdb872560/misp_modules/modules/expansion/joesandbox_query.py) and many others support the new MISP standard format. This new feature allows module developers to create more advanced modules, generating MISP objects and associated relationships from any type of expansion, import or export modules in one click.
|
||||
|
||||
![](/assets/images/misp/blog/misp-modules-new.png)
|
||||
![](/assets/images/misp/blog/misp-modules-2.png)
|
||||
|
@ -42,7 +42,7 @@ Thanks to the contribution from [Kortho](https://github.com/Kortho), the MISP us
|
|||
|
||||
# Security fix (CVE-2019-12868)
|
||||
|
||||
[https://cve.circl.lu/cve/CVE-2019-12868](CVE-2019-12868) has been fixed in MISP 2.4.110. MISP 2.4.109 had remote command execution by a super administrator because the PHP file_exists function is used with user-controlled entries, and phar:// URLs trigger deserialisation. This vulnerability can only be triggered by the site admin. Thanks to Dawid Czarnecki for reporting it.
|
||||
[CVE-2019-12868](https://cve.circl.lu/cve/CVE-2019-12868) has been fixed in MISP 2.4.110. MISP 2.4.109 had remote command execution by a super administrator because the PHP file_exists function is used with user-controlled entries, and phar:// URLs trigger deserialisation. This vulnerability can only be triggered by the site admin. Thanks to Dawid Czarnecki for reporting it.
|
||||
|
||||
# STIX improvements
|
||||
|
||||
|
|
Loading…
Reference in New Issue