Rose debug info
---------------

how human behavior affects security

Later Ctrl + ↑

Programmer’s Digest #101

09/18/2024-09/25/2024 CISA Flags Critical Ivanti vTM Vulnerability, Malware Hidden in Python Packages, Critical Ivanti Cloud Appliance Vulnerability And More.

1. CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation Concerns

CISA added a critical flaw in Ivanti Virtual Traffic Manager (vTM), CVE-2024-7593 (CVSS score: 9.8), to its Known Exploited Vulnerabilities catalog due to active exploitation. This vulnerability allows a remote, unauthenticated attacker to bypass authentication and create rogue admin accounts. Ivanti patched the issue in vTM versions 22.2R1 to 22.7R2 in August 2024. Although no specifics on real-world attacks were shared, a proof-of-concept (PoC) is publicly available. Federal agencies must address the flaw by October 15, 2024. Recent months have seen increased exploitation of Ivanti devices, with over 2,000 exposed instances identified online.

2. Hundreds of Millions of IoT Devices Affected by TCP/IP Security Flaws 

Researchers at JSOF discovered Ripple20, a collection of critical vulnerabilities in the Treck TCP/IP software library used in hundreds of millions of IoT devices. These flaws allow remote code execution, affecting products from major companies like Intel, HP, and Caterpillar. Ripple20 impacts various devices, including printers, IP cameras, UPS systems, and medical equipment. Two vulnerabilities, CVE-2020-11896 and CVE-2020-11897, score 10/10 in severity, posing serious risks like network takeover. The supply chain complexity worsens the issue, as many vendors are unaware they use the vulnerable library. Fixing these flaws is challenging, as they require firmware updates, especially for third-party hardware components. 

3. Software Developers Targeted By Malware Hidden in Python Packages 

North Korean hackers, linked to the Lazarus Group, are targeting Python developers on Mac devices, warns Unit 42. This attack is part of “Operation Dream Job,” where fake job ads lure developers into downloading malicious software. Hackers uploaded four weaponized Python packages—real-ids, coloredtxt, beautifultext, and minisound—on PyPI, which contained the PondRAT malware. PondRAT, a simplified version of POOLRAT (macOS backdoor), can upload/download files and run commands. Lazarus has also expanded its attacks to Linux systems through a sub-group called Gleaming Pisces. These malicious Python packages pose a significant threat to organizations, potentially compromising entire networks.

4. Critical Ivanti Cloud Appliance Vulnerability Exploited in Active Cyberattacks

Ivanti has disclosed that a critical flaw in its Cloud Service Appliance (CSA), CVE-2024-8963 (CVSS score: 9.4), is being actively exploited. The vulnerability, addressed in CSA 4.6 Patch 519 and CSA 5.0, allows remote attackers to access restricted functionality. When combined with CVE-2024-8190 (CVSS score: 7.2), attackers can bypass admin authentication and execute commands. Ivanti acknowledged a limited number of customers have been affected. CISA  has added this vulnerability to its Known Exploited Vulnerabilities catalog, urging agencies to apply patches by October 10, 2024. Ivanti recommends upgrading to CSA version 5.0 immediately.

5. GitLab Releases Fix For Critical SAML Authentication Bypass Flaw

GitLab has released security updates to fix a critical SAML authentication bypass vulnerability (CVE-2024-45409) affecting self-managed GitLab Community (CE) and Enterprise Editions (EE). The flaw, caused by issues in the OmniAuth-SAML and Ruby-SAML libraries, allows attackers to craft malicious SAML responses, bypassing authentication and gaining unauthorized access. The vulnerability impacts versions 17.3.3, 17.2.7, 17.1.8, 17.0.8, 16.11.10, and earlier. GitLab has patched the issue in the latest versions and urges affected users to update immediately. For those unable to upgrade, enabling two-factor authentication (2FA) is recommended. While no confirmed exploitation has been reported, signs of potential attacks include unusual extern_uid values and suspicious IP addresses in authentication logs.

6 mo   digest   programmers'

Programmer’s Digest #100

09/11/2024-09/18/2024 GitLab Patches Critical Flaw, Critical ARM Vulnerability, Critical Ivanti RCE Flaw And More.

1. Urgent: GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job Execution

GitLab has released security updates to fix 17 vulnerabilities, including a critical flaw (CVE-2024-6678, CVSS 9.9) that allows attackers to run pipeline jobs as arbitrary users. This issue affects versions 8.14 to 17.3.1 of GitLab CE/EE. The flaw, along with three high-severity and 13 medium- and low-severity bugs, has been patched in versions 17.3.2, 17.2.5, and 17.1.7. CVE-2024-6678 is the fourth major vulnerability GitLab has addressed this year, following others like CVE-2023-5009. Although there is no evidence of active exploitation, users are urged to apply the patches promptly to avoid potential risks.

2. Critical ARM Vulnerability That Could Have Allowed RCE Patched by SolarWinds

SolarWinds has patched a critical vulnerability in its Access Rights Manager (ARM) software, which could allow remote code execution (CVE-2024-28991, severity 9.0/10). The flaw stems from improper validation of user-supplied data, enabling attackers to exploit deserialization issues. Discovered by Trend Micro’s Zero Day Initiative (ZDI), the bug can bypass weak authentication mechanisms. SolarWinds urges users to update to version 2024.3.1, though no active exploitation has been reported. ARM is used to manage and audit user access rights across IT systems. Despite its prominence, SolarWinds faced scrutiny after a 2020 ransomware breach compromised many customers, leading to a lawsuit from the SEC.

3. Exploit Code Released For Critical Ivanti RCE Flaw, Patch Now 

A proof-of-concept (PoC) exploit for CVE-2024-29847, a critical remote code execution (RCE) vulnerability in Ivanti Endpoint Manager, has been publicly released. The flaw, caused by insecure deserialization in the AgentPortal.exe executable, affects versions before 2022 SU6 and EPM 2024. The exploit allows attackers to perform file operations like executing web shells. Ivanti released patches in September 2024, with no other mitigations or workarounds available. Users are urged to apply the update immediately. In related news, Ivanti’s Endpoint Manager and Cloud Services Appliance have been targeted by attackers, prompting CISA to add the vulnerabilities to its Known Exploited Vulnerabilities catalog.

4. Patch Issued for Critical VMware vCenter Flaw Allowing Remote Code Execution

Broadcom has released updates to fix a critical security flaw in VMware vCenter Server (CVE-2024-38812, CVSS 9.8) that could allow remote code execution. The vulnerability, a heap-overflow in the DCE/RPC protocol, can be triggered by sending a specially crafted packet to the server. It is similar to two other flaws (CVE-2024-37079, CVE-2024-37080) addressed in June 2024. Another issue, CVE-2024-38813 (CVSS 7.5), could allow privilege escalation to root. Security researchers zbl and srs discovered the flaws during the Matrix Cup competition in China. VMware has patched these vulnerabilities in the latest versions of vCenter Server and VMware Cloud Foundation. While no exploitation has been reported, customers are urged to update to protect against potential threats.

5. Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution

A critical security flaw in Google Cloud Platform (GCP) Composer, called CloudImposer, has been patched. Discovered by Tenable, this vulnerability could have enabled remote code execution via a supply chain attack technique known as dependency confusion.

The flaw involved Google’s Composer tool fetching a malicious package from a public repository instead of an internal one. Attackers could exploit this by uploading a fake package with a higher version number to the Python Package Index (PyPI), potentially gaining control over Composer instances. Google fixed the issue in May 2024 by ensuring packages are only installed from private repositories and verifying checksums to prevent tampering. Developers are now advised to use the “--index-url” argument to minimize risk.

6 mo   digest   programmers'

Programmer’s Digest #99

09/04/2024-09/11/2024 Ivanti Releases Urgent Security Updates, Progress LoadMaster Vulnerable, Critical Vulnerability In The LiteSpeed And More.

1. Microsoft September 2024 Patch Tuesday Fixes 4 zero-days, 79 Flaws

Microsoft’s September 2024 Patch Tuesday includes security updates for 79 vulnerabilities, including four actively exploited zero-days and one publicly disclosed. Seven critical vulnerabilities were fixed, mainly involving remote code execution or elevation of privilege.

The flaws break down as follows:

  • 30 Elevation of Privilege;
  • 4 Security Feature Bypass;
  • 23 Remote Code Execution;
  • 11 Information Disclosure;
  • 8 Denial of Service;
  • 3 Spoofing.

The four actively exploited zero-days are:

  • CVE-2024-38014 (Windows Installer Privilege Elevation);
  • CVE-2024-38217 (Mark of the Web Bypass);
  • CVE-2024-38226 (Microsoft Publisher Bypass);
  • CVE-2024-43491 (Windows Update Remote Code Execution).

2. Ivanti Releases Urgent Security Updates for Endpoint Manager Vulnerabilities

Ivanti has released updates for Endpoint Manager (EPM) to fix multiple security flaws, including 10 critical vulnerabilities that could enable remote code execution.

  • CVE-2024-29847 (CVSS 10.0) is a deserialization vulnerability allowing remote code execution by unauthenticated attackers.
  • Nine vulnerabilities (CVSS 9.1) involve SQL injection flaws, allowing remote code execution by authenticated admin users.

The issues impact EPM versions 2024 and 2022 SU5 and earlier. Fixes are available in versions 2024 SU1 and 2022 SU6. While no active exploitation has been reported, users should update promptly. Ivanti also patched high-severity flaws in Workspace Control and Cloud Service Appliance. Zyxel also fixed a critical OS command injection vulnerability in its NAS devices (CVE-2024-6342).

3. Progress LoadMaster Vulnerable to 10/10 Severity RCE Flaw

Progress Software released an emergency fix for a critical vulnerability (CVE-2024-7591) in its LoadMaster and LoadMaster Multi-Tenant (MT) Hypervisor products. The flaw, with a severity score of 10/10, allows unauthenticated attackers to remotely execute commands via a crafted HTTP request, exploiting improper input validation on the management interface. The vulnerability affects LoadMaster version 7.2.60.0 and earlier, and MT Hypervisor version 7.1.35.11 and prior releases. Progress issued an add-on patch to mitigate the flaw, except for the free LoadMaster version, which remains vulnerable.

Although no active exploitation has been reported, users are urged to install the patch and follow recommended security measures.

4. GitHub Actions Vulnerable to Typosquatting, Exposing Developers to Hidden Malicious Code

Threat actors use typosquatting to trick users into visiting malicious sites or downloading harmful software by registering names similar to legitimate ones (e. g., goog1e.com vs. google.com). This technique is also used to target developers through platforms like PyPI, npm, and GitHub Actions. Researchers from Orca found that GitHub Actions, a CI/CD platform, is vulnerable if developers accidentally mistype action names. Malicious actors can create GitHub repositories with misspelled names, leading to the execution of harmful code. A search revealed 198 files with such errors. Users are advised to verify GitHub Actions names carefully, stick to trusted sources, and regularly check for typosquatting risks.

5. LiteSpeed Cache Plugin For WordPress Has a Critical Security Vulnerability

Security researchers have found a critical vulnerability (CVE-2024-44000) in the LiteSpeed Cache plugin for WordPress, allowing unauthenticated attackers to take over websites. The flaw, with a severity score of 7.5, enables attackers to access any logged-in user, including admin accounts. The bug affects version 6.4.1 and earlier, exposing the debug.log file, which contains sensitive information like login credentials and cookies. Although the debug feature is disabled by default, users are urged to update to version 6.5.0.1. LiteSpeed Cache, designed to improve website performance by caching static content, is a popular optimization plugin for WordPress.

6 mo   digest   programmers'
Earlier Ctrl + ↓