Programmer’s Digest #75
03/13/2024-03/20/2024 Critical RCE Vulnerability, Severe SQLi Vulnerability, Kubernetes Vulnerability And More.
1. Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Fortra disclosed a critical security flaw in FileCatalyst, CVE-2024-25153, allowing remote code execution. The vulnerability, with a CVSS score of 9.8, stemmed from a directory traversal issue in the ‘ftpservlet.’ Attackers could upload files outside the designated directory via a crafted POST request. Once uploaded, malicious JSP files could execute code, including web shells. Discovered by Tom Wedgbury, the flaw was patched in FileCatalyst Workflow version 5.1.6 Build 114. Fortra also fixed CVE-2024-25154 and CVE-2024-25155 in FileCatalyst Direct in January 2024, addressing information leakage and code execution vulnerabilities. Given past exploits on Fortra’s MFT solutions, users should promptly apply updates to safeguard against potential threats.
2. Fortinet Warns of Severe SQLi Vulnerability in FortiClientEMS Software
Fortinet has warned of a critical security flaw impacting its FortiClientEMS software that could allow attackers to achieve code execution on affected systems. The vulnerability, tracked as CVE-2023-48788, carries a CVSS rating of 9.3 out of a maximum of 10. It impacts the following versions: FortiClientEMS 7.2.0 through 7.2.2 (Upgrade to 7.2.3 or above); FortiClientEMS 7.0.1 through 7.0.10 (Upgrade to 7.0.11 or above. Horizon3.ai found unpatched vulnerabilities in FortiWLM and FortiSIEM: unauthenticated log file read and static session ID issues. Security researcher Zach Hanley highlighted the risk of session hijacking. Users should update promptly to mitigate risks.
3. WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw
MiniOrange’s Malware Scanner and Web Application Firewall plugins for WordPress have a critical security flaw, CVE-2024-2172, rated 9.8 on CVSS. Versions <= 4.7.2 for Malware Scanner and <= 2.1.1 for Web Application Firewall are affected. The plugins were permanently closed on March 7, 2024. Wordfence reported the flaw, which allows an attacker to gain admin privileges by updating a user's password. This can lead to complete site compromise, including uploading malicious files and modifying content. Similarly, a high-severity flaw in the RegistrationMagic plugin (CVE-2024-1991) was addressed in version 5.3.1.0 on March 11, 2024, affecting all versions up to 5.3.0.0. It allows authenticated attackers to elevate their privileges, with more than 10,000 active installations. Users are urged to delete these plugins immediately to mitigate risks.
4. Researchers Detail Kubernetes Vulnerability That Enables Windows Node Takeover
A high-severity flaw in Kubernetes (CVE-2023-5528, CVSS: 7.2) allows remote code execution with SYSTEM privileges on Windows endpoints within a cluster. Attackers exploit the flaw by applying malicious YAML files. Versions affected include kubelet v1.8.0 onwards, patched in versions like v1.28.4. Successful exploitation could lead to complete takeover of Windows nodes. Similar flaws were disclosed by the web infrastructure company in September 2023. The vulnerability arises from insecure function calls and lack of user input sanitization in Kubernetes volumes, particularly with local volumes. The Kubernetes team patched it by replacing a vulnerable command call with a safer native GO function. Meanwhile, threat actors exploit a critical flaw (CVE-2024-0778, CVSS: 9.8) in the end-of-life Zhejiang Uniview ISC camera model 2500-S to distribute the Mirai botnet variant NetKiller, indicating potential widespread use of the Condi botnet source code released on GitHub.
5. Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer
Cybersecurity researchers have identified numerous GitHub repositories offering cracked software linked to the information stealer RisePro. Dubbed “gitgub,” the campaign involved 17 repositories across 11 accounts, now removed by Microsoft-owned GitHub. These repositories typically featured a README.md file promising free cracked software, embellished with green Unicode circles to feign legitimacy. Each repository directed users to download a RAR archive from “digitalxnetwork[.]com,” containing a 699 MB installer file. Despite its size, the actual payload is a mere 3.43 MB loader designed to inject RisePro (version 1.6) into system processes. RisePro, previously distributed via a pay-per-install malware service, is adept at extracting sensitive information and transmitting it to Telegram channels. Stealer malware, like Snake Keylogger, leverage varied techniques such as FTP, SMTP, and Telegram integration for data exfiltration. Notably, RedLine, Vidar, and Raccoon have emerged as prominent stealers, posing significant threats to cybersecurity. Flashpoint warns of the evolving landscape of information-stealing malware, driven by financial motives and increasing accessibility.