Rose debug info
---------------

how human behavior affects security

Later Ctrl + ↑

Programmer’s Digest #76

03/20/2024-03/27/2024 Sketchy NuGet Package, Active Exploitation of Flaws in Fortinet, Ivanti, and Nice Products, Over 800 npm Packages Found with Discrepancies And More.

1. Sketchy NuGet Package Likely Linked to Industrial Espionage Targets Developers

Threat hunters have discovered a suspicious package, SqzrFramework480, in the NuGet package manager, likely targeting developers working with tools from a Chinese industrial equipment manufacturer. Uploaded on January 24, 2024, by user “zhaoyushun1999,” the package has been downloaded 2,999 times. ReversingLabs noted no similar packages, theorizing it could facilitate industrial espionage via camera-equipped systems. The DLL file within includes features for screen capture and remote pinging, potentially indicating malicious intent. While individual behaviors may not be overtly malicious, combined they raise concerns. This tactic mirrors previous instances of malicious data communication via sockets. The motive remains unclear, but concealing nefarious code in benign software is a known tactic. Despite ambiguity, users must scrutinize libraries before use due to the rising trend of malicious packages in open-source repositories like NuGet.

2. CISA Alerts on Active Exploitation of Flaws in Fortinet, Ivanti, and Nice Products

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation. The vulnerabilities are as follows:

  • CVE-2023-48788: Fortinet FortiClient EMS SQL Injection (CVSS score: 9.3);
  • CVE-2021-44529: Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) Code Injection (CVSS score: 9.8);
  • CVE-2019-7256: Nice Linear eMerge E3-Series OS Command Injection (CVSS score: 10.0).

Fortinet confirmed active exploitation of the FortiClient EMS flaw. Ivanti’s vulnerability allows malicious code execution. Research suggests CVE-2021-44529 might be an intentional backdoor. CVE-2019-7256 has been exploited since February 2020. Federal agencies must apply vendor-provided mitigations by April 15, 2024.CISA and the FBI issued a joint alert urging software makers to address SQL injection flaws, citing the Cl0p ransomware gang’s exploitation of CVE-2023-34362 in Progress Software’s MOVEit Transfer. Despite long-standing awareness and available fixes, manufacturers continue to release vulnerable products, endangering customers.

3. Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects

The Sign1 malware campaign has infiltrated 39,000 WordPress sites in six months, using JavaScript injections to redirect users to scam sites. The latest variant infected at least 2,500 sites in two months. Attackers inject rogue JavaScript into HTML widgets and plugins, allowing malicious code insertion. XOR-encoded JavaScript is decoded to execute a file on a remote server, redirecting to a VexTrio-operated traffic distribution system based on specific criteria. The malware dynamically fetches URLs every 10 minutes to evade blocklists. If visitors don’t come from major websites, the malware doesn’t execute. Suspected to exploit WordPress vulnerabilities, the campaign has used up to 15 domains since July 2023. Attackers may use brute-force attacks or plugin vulnerabilities to compromise sites, often injecting code via the Simple Custom CSS and JS plugin.

4. Over 800 npm Packages Found with Discrepancies, 18 Exploit ‘Manifest Confusion’

New research has discovered over 800 packages in the npm registry which have discrepancies from their registry entries, out of which 18 have been found to exploit a technique called manifest confusion. The problem stems from the fact that the npm registry does not validate whether the manifest file contained in the tarball (package.json) matches the manifest data provided to the npm server during the publishing process via an HTTP PUT request to the package URI endpoint. As a result, a threat actor could take advantage of this lack of cross verification to supply a different manifest containing hidden dependencies that’s processed during package installation to stealthily install malicious dependencies onto the developer’s system.Developers should verify package safety beyond npm’s website. Organizations must ensure all packages are safe, especially regarding manifest confusion, by analyzing for hidden dependencies. Trusting packages solely by appearance on npm’s site may be risky.

5. Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability

Ivanti disclosed a critical remote code execution flaw, CVE-2023-41724, in Standalone Sentry, urging immediate patching. The vulnerability affects versions 9.17.0 to 9.19.0. Ivanti credited NATO Cyber Security Centre for collaboration. Another critical flaw, CVE-2023-46808, impacting on-premises Neurons for ITSM, permits authenticated remote attackers to execute arbitrary code. Patched versions are available. Despite no known customer impact, Ivanti advises applying fixes. Mandiant tracked China-linked cyber espionage clusters exploiting Ivanti flaws. SonarSource revealed an mXSS flaw in Mailspring (CVE-2023-47479), allowing code execution when replying to malicious emails. Yaniv Nizry highlighted mXSS’s ability to bypass sandbox and CSP protections.

6. Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug

Atlassian patched over two dozen security flaws, notably CVE-2024-1597, a critical SQL injection bug in Bamboo Data Center and Server with a CVSS score of 10.0. Despite its severity, Atlassian noted it stems from an org.postgresql dependency, slightly reducing risk. The vulnerability could allow unauthenticated attackers to exploit assets without user interaction. The flaw affects PostgreSQL JDBC Driver versions prior to those listed. Atlassian clarified that Bamboo and other Data Center products aren’t affected as they don’t use the vulnerable query mode. The vulnerability was introduced in specific versions of Bamboo Data Center and Server. SonarSource’s Paul Gerste discovered the flaw. Users should update their instances promptly.

7. GitHub Launches AI-Powered Autofix Tool to Assist Devs in Patching Security Flaws

GitHub introduced code scanning autofix in public beta for Advanced Security customers, utilizing GitHub Copilot and CodeQL to provide targeted recommendations and avoid new security issues. Covering over 90% of alert types in JavaScript, Typescript, Java, and Python, it suggests fixes for two-thirds of vulnerabilities with minimal editing. Leveraging CodeQL, Copilot APIs, and OpenAI GPT-4, it plans to support more languages like C# and Go. Autofix generates potential fixes and provides explanations, extending beyond the current file to include dependencies. Developers must evaluate suggestions to ensure correctness and security, considering potential limitations like syntactic errors, incorrect placements, semantic changes, unresolved root causes, partial fixes, and insecure dependencies. GitHub warns about possible supply chain attacks due to incomplete dependency knowledge.

11 mo   digest   programmers'

Programmer’s Digest #75

03/13/2024-03/20/2024 Critical RCE Vulnerability, Severe SQLi Vulnerability, Kubernetes Vulnerability And More.

1. Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool

Fortra disclosed a critical security flaw in FileCatalyst, CVE-2024-25153, allowing remote code execution. The vulnerability, with a CVSS score of 9.8, stemmed from a directory traversal issue in the ‘ftpservlet.’ Attackers could upload files outside the designated directory via a crafted POST request. Once uploaded, malicious JSP files could execute code, including web shells. Discovered by Tom Wedgbury, the flaw was patched in FileCatalyst Workflow version 5.1.6 Build 114. Fortra also fixed CVE-2024-25154 and CVE-2024-25155 in FileCatalyst Direct in January 2024, addressing information leakage and code execution vulnerabilities. Given past exploits on Fortra’s MFT solutions, users should promptly apply updates to safeguard against potential threats.

2. Fortinet Warns of Severe SQLi Vulnerability in FortiClientEMS Software

Fortinet has warned of a critical security flaw impacting its FortiClientEMS software that could allow attackers to achieve code execution on affected systems. The vulnerability, tracked as CVE-2023-48788, carries a CVSS rating of 9.3 out of a maximum of 10. It impacts the following versions: FortiClientEMS 7.2.0 through 7.2.2 (Upgrade to 7.2.3 or above); FortiClientEMS 7.0.1 through 7.0.10 (Upgrade to 7.0.11 or above. Horizon3.ai found unpatched vulnerabilities in FortiWLM and FortiSIEM: unauthenticated log file read and static session ID issues. Security researcher Zach Hanley highlighted the risk of session hijacking. Users should update promptly to mitigate risks.

3. WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw

MiniOrange’s Malware Scanner and Web Application Firewall plugins for WordPress have a critical security flaw, CVE-2024-2172, rated 9.8 on CVSS. Versions <= 4.7.2 for Malware Scanner and <= 2.1.1 for Web Application Firewall are affected. The plugins were permanently closed on March 7, 2024. Wordfence reported the flaw, which allows an attacker to gain admin privileges by updating a user's password. This can lead to complete site compromise, including uploading malicious files and modifying content. Similarly, a high-severity flaw in the RegistrationMagic plugin (CVE-2024-1991) was addressed in version 5.3.1.0 on March 11, 2024, affecting all versions up to 5.3.0.0. It allows authenticated attackers to elevate their privileges, with more than 10,000 active installations. Users are urged to delete these plugins immediately to mitigate risks.

4. Researchers Detail Kubernetes Vulnerability That Enables Windows Node Takeover

A high-severity flaw in Kubernetes (CVE-2023-5528, CVSS: 7.2) allows remote code execution with SYSTEM privileges on Windows endpoints within a cluster. Attackers exploit the flaw by applying malicious YAML files. Versions affected include kubelet v1.8.0 onwards, patched in versions like v1.28.4. Successful exploitation could lead to complete takeover of Windows nodes. Similar flaws were disclosed by the web infrastructure company in September 2023. The vulnerability arises from insecure function calls and lack of user input sanitization in Kubernetes volumes, particularly with local volumes. The Kubernetes team patched it by replacing a vulnerable command call with a safer native GO function. Meanwhile, threat actors exploit a critical flaw (CVE-2024-0778, CVSS: 9.8) in the end-of-life Zhejiang Uniview ISC camera model 2500-S to distribute the Mirai botnet variant NetKiller, indicating potential widespread use of the Condi botnet source code released on GitHub.

5. Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer

Cybersecurity researchers have identified numerous GitHub repositories offering cracked software linked to the information stealer RisePro. Dubbed “gitgub,” the campaign involved 17 repositories across 11 accounts, now removed by Microsoft-owned GitHub. These repositories typically featured a README.md file promising free cracked software, embellished with green Unicode circles to feign legitimacy. Each repository directed users to download a RAR archive from “digitalxnetwork[.]com,” containing a 699 MB installer file. Despite its size, the actual payload is a mere 3.43 MB loader designed to inject RisePro (version 1.6) into system processes. RisePro, previously distributed via a pay-per-install malware service, is adept at extracting sensitive information and transmitting it to Telegram channels. Stealer malware, like Snake Keylogger, leverage varied techniques such as FTP, SMTP, and Telegram integration for data exfiltration. Notably, RedLine, Vidar, and Raccoon have emerged as prominent stealers, posing significant threats to cybersecurity. Flashpoint warns of the evolving landscape of information-stealing malware, driven by financial motives and increasing accessibility.

11 mo   digest   programmers'

Programmer’s Digest #74

03/06/2024-03/13/2024 Microsoft’s March Updates Fix 61 Vulnerabilities, OpenEdge Vulnerability, Vulnerability in the Popup Builder Plugin, PyPI Python Packages Can Drain Your Crypto Wallets And More.

1. Microsoft’s March Updates Fix 61 Vulnerabilities, Including Critical Hyper-V Flaws

Microsoft released its monthly security update, fixing 61 flaws across its software, including two critical issues in Windows Hyper-V that could lead to DoS and remote code execution. Of these vulnerabilities, two are Critical, 58 are Important, and one is Low severity. Although none are publicly known or actively attacked, six are tagged “Exploitation More Likely.” This update also patches 17 flaws in the Chromium-based Edge browser since February 2024. Critical issues include Hyper-V flaws CVE-2024-21407 and CVE-2024-21408. Additionally, there are privilege escalation flaws in Azure Kubernetes Service, Windows Composite Image File System, and Authenticator. Notably, CVE-2024-21390 could allow an attacker to access multi-factor authentication codes. Another critical flaw is CVE-2024-21334, a remote code execution in Open Management Infrastructure.

2. Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability

A critical security flaw (CVE-2024-1403) in Progress Software OpenEdge Authentication Gateway and AdminServer allows bypassing authentication protections. It affects OpenEdge versions 11.7.18 and earlier, 12.2.13 and earlier, and 12.8.0. The flaw, rated 10.0 on the CVSS scale, enables unauthorized access due to mishandling of usernames and passwords. Progress Software released fixes in versions OpenEdge LTS Update 11.7.19, 12.2.14, and 12.8.1. A PoC exploit has been released by Horizon3.ai, revealing the flaw’s root cause in a function called connect(). This function invokes authorizeUser(), which if supplied with specific credentials, can bypass authentication. However, accessing deeper attack surfaces, like deploying new applications, requires increased complexity due to internal service message brokers and custom messages, noted security researcher Zach Hanley.

3. Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites

A malware campaign exploits a severe vulnerability in the Popup Builder plugin for WordPress, infecting over 3,900 sites within three weeks, as reported by Sucuri. Exploiting CVE-2023-6000, attackers create rogue admin users and install arbitrary plugins. This flaw was also exploited in a previous Balada Injector campaign, compromising over 7,000 sites in January. The current attacks inject malicious JavaScript code, redirecting visitors to phishing and scam pages. WordPress site owners are urged to update plugins, scan for suspicious code or users, and perform cleanup. Meanwhile, Wordfence disclosed a high-severity XSS bug (CVE-2024-2123) in the Ultimate Member plugin, patched in version 2.8.4 on March 6, 2024. This flaw allows unauthenticated attackers to inject arbitrary web scripts, potentially gaining administrative access. 

4. Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client

Cisco has patched a high-severity vulnerability (CVE-2024-20337, CVSS score: 8.2) in its Secure Client software, enabling a threat actor to initiate a VPN session with a targeted user. Arising from insufficient validation of user input, a malicious link could be used to execute arbitrary script code in the browser, accessing sensitive information like a valid SAML token. This token could then be exploited to establish a remote access VPN session as the affected user. The flaw affects Secure Client for Windows, Linux, and macOS, with fixes available in versions 4.10.08025, 5.1.2.42, and beyond. The vulnerability enables attackers to access internal networks when victims visit a controlled website. Additionally, Cisco addressed CVE-2024-20338 (CVSS score: 7.3) in Secure Client for Linux, allowing local attackers to elevate privileges; fixed in version 5.1.2.42.

5. CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability

 CISA  added a critical security flaw impacting JetBrains TeamCity On-Premises software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.The vulnerability, tracked as CVE-2024-27198 (CVSS score: 9.8), refers to an authentication bypass bug that allows for a complete compromise of a susceptible server by a remote unauthenticated attacker. It was addressed by JetBrains earlier this week alongside CVE-2024-27199 (CVSS score: 7.3), another moderate-severity authentication bypass flaw that allows for a “limited amount” of information disclosure and system modification.The vulnerabilities may enable an unauthenticated attacker with HTTP(S) access to a TeamCity server to bypass authentication checks and gain administrative control of that TeamCity server. In light of active exploitation, users running on-premises versions of the software are advised to apply the updates as soon as possible to mitigate potential threats.

6. Watch Out: These PyPI Python Packages Can Drain Your Crypto Wallets

Threat hunters uncovered seven Python packages on PyPI designed to steal BIP39 mnemonic phrases for cryptocurrency wallets, dubbed BIPClip by ReversingLabs. The packages were downloaded 7,451 times before removal. Operating since December 2022, this campaign targeted crypto wallet developers. Though one package, mnemonic_to_address, lacked malicious functionality, it listed bip39-mnemonic-decrypt as a dependency, containing the harmful component. These packages stealthily exfiltrate mnemonic phrases to a controlled server. ReversingLabs identified two other packages, public-address-generator and erc20-scanner, working similarly. Hashdecrypts, meanwhile, functions independently to harvest data. The GitHub profile “HashSnake’’ is associated with these packages, with a repository named hCrypto advertised for phrase extraction. The packages were meticulously crafted to target crypto wallets, minimizing detection by security tools.

12 mo   digest   programmers'
Earlier Ctrl + ↓