Rose debug info
---------------

how human behavior affects security

Later Ctrl + ↑

Programmer’s Digest #114

12/18/2024-12/25/2024 Critical Fortinet EMS Vulnerability, PyPI Packages Stealing Keystrokes, Rspack npm Packages Compromised, Thousands Download Malicious npm Libraries.

1. Sophos Patches Critical Firewall Vulnerabilities

Sophos has issued patches for a critical firewall vulnerability, CVE-2024-12727 (CVSS 9.8), which allows remote code execution (RCE) through an SQL injection in the email protection feature. This flaw impacts firewalls configured with Secure PDF eXchange (SPX) in High Availability (HA) mode and affects 0.05% of devices. The issue is resolved in Sophos Firewall version 21.0 MR1 (21.0.1). Additionally, CVE-2024-12728 (CVSS 9.8), involving weak SSH credentials in HA setups, affects 0.5% of devices. Users should restrict SSH access, use strong passphrases, and disable WAN access via SSH. Another vulnerability, CVE-2024-12729 (CVSS 8.8), allows authenticated attackers to execute remote code via the User Portal. To mitigate risks, users should disable WAN access to the User Portal and Webadmin. Sophos emphasizes there’s no evidence of exploitation yet, but urges immediate updates.

2. Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools

A critical vulnerability, CVE-2023-48788 (CVSS 9.3), in Fortinet FortiClient EMS has been exploited in a cyber campaign to install remote desktop tools like AnyDesk and ScreenConnect. The SQL injection flaw enables unauthorized code execution via crafted data packets. Kaspersky reported the October 2024 attack on a company’s internet-exposed Windows server with open FortiClient EMS ports. The attackers used the flaw for initial access, installing ScreenConnect and uploading additional tools for credential theft, network scanning, and persistence. Dropped tools included Mimikatz, webbrowserpassview.exe (password recovery), and netscan.exe (network scanning). Targets spanned multiple countries, including Brazil, India, and Spain. Attackers used various ScreenConnect subdomains for lateral movement. Kaspersky also observed CVE-2023-48788 being exploited to execute PowerShell scripts via webhook[.]site domains, highlighting evolving attacker tactics. A similar campaign was uncovered earlier, using the vulnerability to deliver ScreenConnect and Metasploit payloads. 

3. Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts

Cybersecurity researchers have identified two malicious Python packages, zebo and cometlogger, uploaded to the PyPI repository. These packages, downloaded 118 and 164 times respectively before removal, were designed to exfiltrate sensitive data from compromised systems. The packages collected system metadata, network and Wi-Fi details, running processes, and clipboard content. They also incorporated checks to evade virtual environments and terminated browser-related processes for unrestricted file access.

Fortinet noted that the script operates asynchronously to efficiently steal large volumes of data. These findings underscore the ongoing risks posed by malicious packages in open-source repositories.

4. Apache Tomcat Vulnerability CVE-2024-56337

The Apache Software Foundation (ASF) has patched CVE-2024-56337, a vulnerability in Apache Tomcat that could lead to remote code execution (RCE) under specific conditions. This TOCTOU race condition affects Tomcat versions 11.0.0-M1 to 11.0.1, 10.1.0-M1 to 10.1.33, and 9.0.0.M1 to 9.0.97, stemming from incomplete mitigation of CVE-2024-50379 (CVSS 9.8).

Exploitation is possible on case-insensitive file systems with the default servlet write enabled (readonly initialization set to false). Proper configuration based on Java versions is critical:

  • Java 8/11: Set sun.io.useCanonCaches to false.
  • Java 17: Ensure the property is false (default).
  • Java 21+: No action required (property removed).

Future Tomcat versions (11.0.3, 10.1.35, 9.0.99) enforce these configurations. Researchers Nacl, WHOAMI, Yemoli, and Ruozhi discovered these flaws, with KnownSec 404 Team independently reporting CVE-2024-56337 along with a proof-of-concept.

5. CISA Adds Critical Flaw in BeyondTrust Software to Exploited Vulnerabilities Catalog

CISA added CVE-2024-12356, a critical command injection vulnerability (CVSS 9.8), in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products, to its KEV. This flaw allows unauthenticated attackers to inject and execute operating system commands as a site user via malicious client requests. BeyondTrust confirmed all versions of PRA and RS prior to 22.1.x are affected and has released patches to address the issue.

Federal agencies must fix this vulnerability by December 27, 2024, as per Binding Operational Directive (BOD) 22-01, which mandates mitigation of listed vulnerabilities to protect government networks. Private organizations are also urged to review the KEV catalog and secure their systems to prevent exploitation.

6.  Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack

Rspack developers disclosed a supply chain attack compromising their npm packages, @rspack/core and @rspack/cli, which were replaced with malicious versions containing cryptocurrency mining malware. The affected versions, 1.1.7, were removed, and the latest safe release is 1.1.8. The rogue packages exploited a postinstall script to download and execute an XMRig miner on Linux hosts. They also exfiltrated sensitive data, including cloud credentials and IP details, targeting machines in specific countries like China and Russia. The malware activated automatically upon installation. Rspack, a high-performance JavaScript bundler written in Rust and adopted by major companies, sees over 300,000 weekly downloads for @rspack/core. Maintainers revoked all npm and GitHub tokens, secured permissions, and audited code to prevent further breaches. Another npm package, vant (41,000 weekly downloads), was similarly compromised via a stolen npm token. This incident underscores the urgent need for stricter safeguards in software package management.

7. Thousands Download Malicious npm Libraries Impersonating Legitimate Tools

Threat actors have uploaded malicious typosquats of npm packages like typescript-eslint and @types/node, which have accumulated thousands of downloads. These fake packages, named @typescript_eslinter/eslint and types-node, deliver trojans and second-stage payloads. Sonatype’s analysis revealed that @typescript_eslinter/eslint includes a file, prettier.bat, which installs itself in Windows Startup. Despite its name, it’s a disguised trojan executable. The package impersonates popular tools to deceive users. Similarly, types-node fetches malicious scripts from a Pastebin URL to execute a deceptive npm.exe payload. ReversingLabs also flagged malicious Visual Studio Code (VSCode) extensions, such as Ethereum.SoliditySupport and ZoomWorkspace.Zoom, targeting the crypto community and broader users. These extensions contained obfuscated JavaScript to download unknown second-stage payloads. These findings highlight the critical need for stronger supply chain security and vigilance when using open-source tools to avoid introducing malicious code into projects.

23 d   digest   programmers'

Programmer’s Digest #113

12/11/2024-12/18/2024 Two Vulnerabilities in The Hunk Companion, 390,000+ WordPress Credentials Stolen via Malicious GitHub Repository, Critical OpenWrt Vulnerability.

1. Two Vulnerabilities in The Hunk Companion and WP Query Console WordPress Plugins 

Threat actors are exploiting two vulnerabilities in the Hunk Companion and WP Query Console WordPress plugins to gain backdoor access to websites. Hunk Companion, a plugin for ThemeHunk themes, has a missing capability check allowing unauthorized plugin installations. Tracked as CVE-2024-9707 (CVSS 9.8), this flaw can enable remote code execution if another vulnerable plugin is active. While patches were released in October and December, 90% of its 10,000 installations remain unpatched. Over the past day, Defiance blocked 56,000 attacks targeting this vulnerability. Attackers use it to install WP Query Console, an outdated plugin with a remote code execution flaw (CVE-2024-50498, CVSS 9.8). This vulnerability, disclosed in October, allows full control of websites. Admins should update Hunk Companion to version 1.9.0 immediately and check for unauthorized plugins or intrusions.

2. New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP

Cybersecurity researchers have uncovered a new PHP-based backdoor, Glutton, used in attacks targeting China, the U.S., Cambodia, Pakistan, and South Africa. Discovered by QiAnXin XLab in April 2024, the malware is linked with moderate confidence to the Chinese nation-state group Winnti (APT41). Glutton targets PHP frameworks like Baota, ThinkPHP, Yii, and Laravel to steal system information, inject code, and plant ELF backdoors. Despite ties to Winnti, Glutton lacks typical stealth features, such as encrypted C2 communications, and relies on HTTP for payload delivery. Notably, Glutton also targets cybercriminals by poisoning their operations. The backdoor exploits zero-day flaws and brute-force attacks, using a “task_loader” module to download additional components, including ELF malware masquerading as FastCGI Process Manager. It supports 22 commands for operations like file management and remote code execution. Glutton’s modular design ensures stealth by operating within PHP processes, leaving no traceable payloads. Researchers highlighted its dual focus on traditional victims and cybercrime operators, turning attackers’ tools against them.

3. 390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits

A now-removed GitHub repository advertising a WordPress tool is believed to have enabled the exfiltration of over 390,000 credentials. The campaign, linked to the threat actor MUT-1244, targeted pentesters, security researchers, and malicious actors, stealing sensitive data like SSH keys and AWS credentials.MUT-1244 used phishing and trojanized GitHub repositories claiming to host proof-of-concept (PoC) exploit code but containing malware. One repository, “yawpp,” claimed to be a WordPress poster but deployed malware via a rogue npm dependency, compromising credentials and exfiltrating them to a Dropbox account. MUT-1244 also employed phishing emails, tricking victims into executing malicious shell commands. Payload delivery methods included backdoored compilation files, malicious PDFs, Python droppers, and npm packages like “0xengine/meow.” The campaign highlights attackers exploiting GitHub PoCs and targeting cybersecurity professionals to steal data for further attacks. Researchers warn of the growing trend of fake PoCs used to compromise systems and spread malware.

4. Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection

A critical security flaw (CVE-2024-54143, CVSS 9.3) in OpenWrt’s Attended Sysupgrade (ASU) feature could allow attackers to distribute malicious firmware packages. Discovered by Flatt Security researcher RyotaK and patched in ASU version 920c8a1, the flaw involves command injection and a truncated SHA-256 hash that enables hash collisions. Exploitation allows attackers to inject arbitrary commands into the build process, creating malicious firmware images signed with a legitimate build key. Worse, a 12-character hash collision could swap a legitimate image with a prebuilt malicious one, posing a severe supply chain risk.

The vulnerability does not require authentication, allowing crafted package lists to compromise build requests. OpenWrt warns that attackers could force legitimate requests to receive malicious images. While it’s unclear if this flaw has been exploited, users are urged to update to the latest version immediately to mitigate potential risks.

1 mo   digest   programmers'

Programmer’s Digest #112

12/04/2024-12/11/2024 Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel, Cleo File Transfer Vulnerability, CLFS Driver Flaw And More.

1. CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel

CISA has added vulnerabilities affecting Zyxel, North Grid Proself, ProjectSend, and CyberPanel products to its Known Exploited Vulnerabilities (KEV) catalog due to active exploitation. These include CVE-2024-51378 (CVSS: 10.0), a critical flaw enabling command execution via authentication bypass; CVE-2023-45727, tied to a China-linked espionage group; CVE-2024-11680, exploited for web shell deployments; and CVE-2024-11667, abused in ransomware campaigns like PSAUX and Helldown. Agencies must address these issues by December 25, 2024. Separately, JPCERT/CC reports three exploited vulnerabilities in I-O DATA routers, including CVE-2024-52564 (CVSS: 7.5), allowing attackers to disable firewalls. While some fixes are available, others are expected by December 18, 2024. Users should restrict remote management, secure credentials, and update firmware promptly.

2. Cleo File Transfer Vulnerability Under Exploitation 

Huntress warned that an improperly patched vulnerability (CVE-2024-50623) in Cleo’s file transfer products—Harmony, VLTrader, and LexiCom—has been exploited in the wild since early December. The flaw, meant to be fixed in version 5.8.0.21, allows remote code execution. Threat actors have used it to establish persistence, perform reconnaissance, and conduct stealthy post-exploitation activities. At least 10 businesses, primarily in the consumer goods, food, trucking, and shipping sectors, have been compromised, with attack attempts targeting 1,700 servers. Exploitation surged on December 8. The incident resembles the MOVEit hack, where a zero-day was used to steal vast data from numerous organizations.Huntress and Rapid7 have observed active attacks, shared indicators of compromise, and provided mitigation guidance. Cleo is preparing a new patch, expected mid-week, and updating its advisory.

3. CISA Adds Microsoft Windows CLFS Driver Flaw To Its Known Exploited Vulnerabilities Catalog

CISA has added CVE-2024-49138, a Microsoft Windows Common Log File System (CLFS) driver vulnerability (CVSS: 7.8), to its KEV catalog. This flaw, addressed in Microsoft’s December 2024 Patch Tuesday updates, allows local attackers to escalate privileges to SYSTEM via a heap-based buffer overflow. While Microsoft has not disclosed details of the attacks exploiting this zero-day, federal agencies are required to remediate the vulnerability by December 31, 2024, under Binding Operational Directive 22-01. Private organizations are also urged to review the KEV catalog and mitigate listed vulnerabilities to secure their systems. The flaw is part of 71 vulnerabilities patched this month, highlighting the importance of timely updates to prevent potential exploitation.

4. Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities

Ivanti has issued security updates to fix critical vulnerabilities in its Cloud Services Application (CSA) and Connect Secure products, which could lead to privilege escalation and remote code execution. Key flaws include CVE-2024-11639 (CVSS: 10.0), an authentication bypass allowing remote attackers to gain admin access, and CVE-2024-11772, a command injection issue enabling code execution. Other vulnerabilities, such as CVE-2024-11773, CVE-2024-11633, and CVE-2024-11634, involve SQL injection and argument injection attacks. CVE-2024-8540 (CVSS: 8.8) addresses insecure permissions in Ivanti Sentry, allowing local attackers to modify components. Fixes are available in Ivanti CSA 5.0.3, Connect Secure 22.7R2.4, Policy Secure 22.7R1.2, and Sentry versions 9.20.2, 10.0.2, and 10.1.0. While no active exploitation has been reported, users are urged to update promptly, as Ivanti products have previously been targeted by state-sponsored attackers.

5. Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks

Cybersecurity researchers have uncovered security flaws in open-source machine learning (ML) tools like MLflow, H2O, PyTorch, and MLeap, potentially allowing code execution. Discovered by JFrog, these issues target ML clients and libraries handling safe model formats like Safetensors.Key vulnerabilities include CVE-2024-27132 (XSS in MLflow, enabling client-side remote code execution), CVE-2024-6960 (unsafe deserialization in H2O, leading to code execution), and path traversal flaws in PyTorch and MLeap, allowing arbitrary file overwrite and potential code execution. Attackers exploiting these flaws could gain access to ML services like model registries or MLOps pipelines, enabling lateral movement, exposure of credentials, and backdooring of ML models.

JFrog warns against loading untrusted ML models, even from safe formats, as they may lead to remote code execution. Organizations must scrutinize their ML models to prevent significant damage from these vulnerabilities.

1 mo   digest   programmers'
Earlier Ctrl + ↓