Programmer’s Digest #84
05/15/2024-05/30/2024 Flaws in Python Package, New Flaws in QTS and QuTS Hero Impacting NAS Appliances, Ivanti Patches Critical Remote Code Execution Flaws, Cybercriminals Abuse Stack Overflow to Promote Malicious Python Package And More.
1. Critical GitHub Enterprise Server Flaw Allows Auth Bypass, Fix Now
GitHub has fixed an authentication bypass vulnerability in GitHub Enterprise Server (GHES) related to SAML single sign-on (SSO) with encrypted assertions (CVE-2024-4985, CVSS v4 score: 10.0). This flaw allowed attackers to forge SAML responses, gaining site admin access without prior authentication. GHES, a self-hosted platform for software development, is not affected if encrypted assertions are disabled. The vulnerability impacted all versions before 3.13.0 and was reported via GitHub’s Bug Bounty program.
Fixes were released on May 20th in versions 3.9.15, 3.10.12, 3.11.10, and 3.12.4. GitHub advises upgrading to these versions or newer to prevent potential future exploits.
2. Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox
A critical security flaw in the llama_cpp_python Python package (CVE-2024-34359, CVSS score: 9.7) has been disclosed, potentially allowing arbitrary code execution. Named Llama Drama by Checkmarx, this vulnerability stems from the misuse of the Jinja2 template engine, leading to server-side template injection. With over 3 million downloads, llama_cpp_python is a popular tool for integrating AI models with Python. The flaw, discovered by security researcher Patrick Peng (retr0reg), has been fixed in version 0.2.72. Exploitation could result in data theft, system compromise, and operational disruption.
Additionally, a high-severity flaw (CVE-2024-4367) in Mozilla’s PDF.js library allows arbitrary JavaScript execution in PDF.js. This has been fixed in Firefox 126, Firefox ESR 115.11, Thunderbird 115.11, and pdfjs-dist version 4.2.67.
3. Microsoft’s Transition From VBScript To JavaScript And PowerShell
Microsoft will discontinue VBScript by late 2024, gradually phasing it out of Windows. Initially introduced in 1996, VBScript will transition to an on-demand feature before its complete removal in future Windows versions.
VBScript has been surpassed by more robust alternatives like PowerShell and JavaScript, leading to its retirement.
Key reasons include:
- Security Vulnerabilities: VBScript’s architecture is prone to exploitation.
- Limited Functionality: Modern languages like JavaScript and PowerShell offer more advanced features.
- Modernization Focus: Microsoft’s shift towards updated scripting solutions.
The deprecation timeline includes:
- Second half of 2024: VBScript becomes an on-demand feature in Windows 11 24H2.
- Around 2027: VBScript remains available on-demand but is not enabled by default.
- Future Date: Complete removal from Windows.
Microsoft recommends transitioning to JavaScript and PowerShell for enhanced security and functionality.
4. Ivanti Patches Critical Remote Code Execution Flaws in Endpoint Manager
Ivanti has fixed multiple critical security flaws in Endpoint Manager (EPM) that could allow remote code execution. Six vulnerabilities (CVE-2024-29822 to CVE-2024-29827, CVSS 9.6) involve SQL injection flaws allowing unauthenticated attackers to execute arbitrary code. Four additional bugs (CVE-2024-29828 to CVE-2024-29830, CVE-2024-29846, CVSS 8.4) require attacker authentication.
The affected versions are Ivanti EPM 2022 SU5 and prior. Ivanti also addressed a high-severity flaw in Avalanche version 6.4.3.602 (CVE-2024-29848, CVSS 7.2) allowing remote code execution via a specially crafted file. Other fixes include vulnerabilities in Neurons for ITSM, Connect Secure, and the Secure Access client for Windows and Linux.
There is no evidence of these flaws being exploited in the wild. Users should update to the latest versions to mitigate potential threats.
5. CISA Alert on Active Exploitation of a Vulnerability
On May 23, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) added a critical Apache Flink vulnerability (CVE-2020-17519) to its Catalog of Known Exploited Vulnerabilities (KEV). Despite being patched in January 2021, it is actively exploited, endangering many systems. CVE-2020-17519 is an inappropriate access control flaw in Apache Flink, allowing attackers to read any file on the JobManager’s local file system via its REST interface. This affects Flink versions 1.11.0 to 1.11.2.
Recommendations:
- CISA: Apply mitigation measures or stop using vulnerable versions. Upgrade to Flink 1.11.3 or 1.12.0 by June 13, 2024.
- NIST: Upgrade to patched versions following the April 2024 advisory.
Exploits of CVE-2020-17519 and other vulnerabilities (e. g., CVE-2020-28188) have compromised data security since late 2020. CISA urges quick implementation of patches and mitigations to protect against active threats and secure sensitive data.
6. Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique
The CatDDoS botnet has exploited over 80 security flaws in the past three months to hijack devices for DDoS attacks. The vulnerabilities affect routers and devices from companies like Apache, Cisco, D-Link, Huawei, Jenkins, NETGEAR, and more.
CatDDoS, a variant of the Mirai botnet, emerged in August 2023 and targets China, the U.S., Japan, and other countries. It uses the ChaCha20 algorithm for C2 communication and shares cryptographic elements with other botnets like hailBot and VapeBot. The original authors likely ceased operations in December 2023, but new variants have since emerged.
Researchers also revealed a powerful PDoS technique called DNSBomb (CVE-2024-33655), which exploits DNS features to create high-volume traffic bursts. BIND software is not vulnerable to this attack.
7. Cybercriminals Abuse Stack Overflow to Promote Malicious Python Package
Cybersecurity researchers have discovered a malicious Python package named “pytoileur” in the Python Package Index (PyPI) repository, aimed at cryptocurrency theft. This package, downloaded 316 times, was re-uploaded as version 1.0.2 after version 1.0.1 was removed on May 28, 2024.
According to Sonatype, the malicious code is in the setup.py script, executing a Base64-encoded payload to retrieve a Windows binary, “Runtime.exe,” which runs via PowerShell and VBScript commands. This binary installs spyware and data-stealing malware.
A StackOverflow account, “EstAYA G,” has been promoting this package as a solution to user queries. Sonatype and Stack Overflow have linked this to the same threat actor behind previous malicious packages like Pystob and Pywool. This incident highlights the risks in open-source ecosystems and the need for vigilant security practices.
8. New Report Warns of LLM-Enhanced Cyber Threats: Polymorphic Malware, Customer Service Jailbreaking, and Highly Personalized Spearphishing
Recent advancements in Large Language Models (LLMs) are making it possible to automate tasks that were once considered too complex, including those with malicious intent. In a collaborative technology exploration project, the Netherlands Organization for Applied Scientific Research (TNO) and the National Cyber Security Centre (NCSC-NL) examined how LLMs could influence the cyber threat landscape over the next three to five years.
The report focuses on the current and near-future capabilities of LLMs and their potential to enhance cyber threats. While it does speculate on some future possibilities, it is grounded in the present realities of what LLMs can already do or are likely to do in the near term.