Programmer’s Digest #42
07/26/2023-08/02/2023 Recently Patched Critical Ivanti EPMM Vulnerability, New P2PInfect Worm Targets Redis Servers, Two Severe Linux Vulnerabilities Impact 40% of Ubuntu Users And More.
1. Researchers Discover Bypass for Recently Patched Critical Ivanti EPMM Vulnerability
Cybersecurity researchers have discovered a bypass for a recently fixed actively exploited vulnerability in some versions of Ivanti Endpoint Manager Mobile (EPMM). Tracked as CVE-2023-35082 (CVSS score: 10.0) and discovered by Rapid7, the issue “allows unauthenticated attackers to access the API in older unsupported versions of MobileIron Core (11.2 and below).” If exploited, this vulnerability enables an unauthorized, remote (internet-facing) actor to potentially access users’ personally identifiable information and make limited changes to the server. It also comes as cybersecurity agencies from Norway and the U.S. revealed that CVE-2023-35078 and CVE-2023-35081 have been exploited by unnamed nation-state groups at least since April 2023 to drop web shells and gain persistent remote access to compromised systems.
- CVE-2023-35078 (CVSS score: 10.0) – An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.
- (CVSS score: 7.2) – A path traversal vulnerability is discovered in Ivanti EPMM that allows an attacker to write arbitrary files onto the appliance.
While there is no evidence of active exploitation of CVE-2023-35082 in the wild, it’s recommended that users upgrade to the latest supported version to secure against potential threats.
2. Researchers Uncover AWS SSM Agent Misuse as a Covert Remote Access Trojan
Researchers have unveiled a new post-exploitation method within Amazon Web Services (AWS) that repurposes the AWS Systems Manager Agent (SSM Agent) as a remote access trojan for Windows and Linux systems. With high privilege access to an endpoint running SSM Agent, attackers can engage in sustained malicious activities. As a legitimate admin tool, SSM Agent can be exploited to perform nefarious actions, leveraging its trusted status to avoid security solution detection and the need for additional malware. The technique allows attackers to remotely control compromised SSM Agents and potentially infiltrate endpoints. While AWS states no immediate action is required, vigilance, removing SSM binaries from antivirus allow lists, and securing EC2 instances are recommended by experts.
3. New P2PInfect Worm Targets Redis Servers with Undocumented Breach Methods
The P2PInfect worm has expanded its tactics to compromise vulnerable Redis servers, using multiple initial access methods. Researchers discovered that the malware infiltrates exposed Redis instances by exploiting the replication feature. Another technique involves registering a malicious cron job on the Redis host to download the malware from a remote server upon execution. The worm is Rust-based and has been observed to alter iptables firewall rules, self-upgrade, and potentially deploy cryptocurrency miners. P2PInfect forms a peer-to-peer botnet, with each infected server as a node connecting to others, allowing it to communicate without a centralized command-and-control server. The identity of the threat actors and the malware’s purpose remain uncertain.
4. Multiple Flaws Found in Ninja Forms Plugin Leave 800,000 Sites Vulnerable
Multiple security vulnerabilities have been disclosed in the Ninja Forms plugin for WordPress that could be exploited by threat actors to escalate privileges and steal sensitive data.
The flaws, tracked as CVE-2023-37979, CVE-2023-38386, and CVE-2023-38393, impact versions 3.6.25 and below, Patchstack said in a report last week. Ninja Forms is installed on over 800,000 sites.
A brief description of each of the vulnerabilities is below:
- CVE-2023-37979 (CVSS score: 7.1) – A POST-based reflected cross-site scripting (XSS) flaw that could allow any unauthenticated user to achieve privilege escalation on a target WordPress site by tricking privileged users to visit a specially crafted website.
- CVE-2023-38386 and CVE-2023-38393 – Broken access control flaws in the form submissions export feature that could enable a bad actor with Subscriber and Contributor roles to export all Ninja Forms submissions on a WordPress site.
Users of the plugin are recommended to update to version 3.6.26 to mitigate potential threats.
5. Hackers Deploy “SUBMARINE” Backdoor in Barracuda Email Security Gateway Attacks
The U.S. CISA has revealed details about the SUBMARINE backdoor, linked to the Barracuda Email Security Gateway (ESG) appliance hack. This backdoor includes artifacts such as shell scripts, a loaded library for a Linux daemon, and a SQL trigger, enabling root privilege execution, persistence, command and control, and cleanup. The backdoor emerged from an analysis of malware samples acquired from a compromised organization that fell victim to threat actors exploiting the CVE-2023-2868 flaw in ESG devices. The attackers, suspected to have a China nexus, employed SUBMARINE as part of their persistent access strategy, leveraging it to evade remediation efforts and establish control over the compromised environment. Barracuda recommends discontinuing use of compromised ESG appliances and seeking replacements.
6. GameOver(lay): Two Severe Linux Vulnerabilities Impact 40% of Ubuntu Users
Cybersecurity researchers have disclosed two high-severity security flaws in the Ubuntu kernel that could pave the way for local privilege escalation attacks. Cloud security firm Wiz, in a report shared with The Hacker News, said the easy-to-exploit shortcomings have the potential to impact 40% of Ubuntu users. The vulnerabilities – tracked as CVE-2023-2640 and CVE-2023-32629 (CVSS scores: 7.8) and dubbed GameOver(lay) – are present in a module called OverlayFS and arise as a result of inadequate permissions checks in certain scenarios, enabling a local attacker to gain elevated privileges. Overlay Filesystem refers to a union mount file system that makes it possible to combine multiple directory trees or file systems into a single, unified file system.
A brief description of the two flaws is below
- CVE-2023-2640 – On Ubuntu kernels carrying both c914c0e27eb0 and “UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs,” an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
- CVE-2023-32629 – Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels.
In a nutshell, GameOver(lay) makes it possible to “craft an executable file with scoped file capabilities and trick the Ubuntu Kernel into copying it to a different location with unscoped capabilities, granting anyone who executes it root-like privileges.”
7. Major Security Flaw Discovered in Metabase BI Software – Urgent Update Required
A critical vulnerability (CVE-2023-38646) in Metabase, a popular business intelligence software, could lead to pre-authenticated remote code execution. Users of versions prior to 0.46.6.1 for open-source editions and Metabase Enterprise versions before 1.46.6.1 are advised to update immediately. The flaw enables unauthenticated attackers to execute arbitrary commands with the same privileges as the Metabase server. Although no exploitation evidence exists, over 5,000 out of 6,936 instances were found vulnerable as of July 26, 2023. The issue arises from a JDBC connection problem in the API endpoint “/api/setup/validate,” allowing attackers to gain a reverse shell through an SQL injection flaw in the H2 database driver.