Programmer’s Digest #39
06/29/2023-07/05/2023 CVE-2023-27997 RCE Flaw, Critical SQL Injection Flaws, Unpatched WordPress Plugin Flaw And More
1. Alert: 330,000 FortiGate Firewalls Still Unpatched to CVE-2023-27997 RCE Flaw
No less than 330,000 FortiGate firewalls are still unpatched and vulnerable to CVE-2023-27997, a critical security flaw affecting Fortinet devices that has come under active exploitation in the wild. Cybersecurity firm Bishop Fox said that out of nearly 490,000 Fortinet SSL-VPN interfaces exposed on the internet, about 69 percent remain unpatched. CVE-2023-27997 (CVSS score: 9.8), also called XORtigate, is a critical vulnerability impacting Fortinet FortiOS and FortiProxy SSL-VPN appliances that could allow a remote attacker to execute arbitrary code or commands via specifically crafted requests. Patches were released by Fortinet last month in versions 6.0.17, 6.2.15, 6.4.13, 7.0.12, and 7.2.5, although the company acknowledged that the flaw may have been “exploited in a limited number of cases” in attacks targeting government, manufacturing, and critical infrastructure sectors. Many of the publicly accessible Fortinet devices did not receive an update for the past eight years, with the installations running FortiOS versions 5 and 6.
2. Critical SQL Injection Flaws Expose Gentoo Soko to Remote Code Execution
Multiple SQL injection vulnerabilities have been disclosed in Gentoo Soko that could lead to remote code execution (RCE) on vulnerable systems. These SQL injections happened despite the use of an Object-Relational Mapping (ORM) library and prepared statements. The two issues, which were discovered in the search feature of Soko, have been collectively tracked as CVE-2023-28424 (CVSS score: 9.1). They were addressed within 24 hours of responsible disclosure on March 17, 2023. The shortcomings identified in the service meant that it could have been possible for a malicious actor to inject specially crafted code, resulting in the exposure of sensitive information. The development comes months after SonarSource uncovered a cross-site scripting (XSS) flaw in an open-source business suite called Odoo that could be exploited to impersonate any victim on a vulnerable Odoo instance as well as exfiltrate valuable data.
3. New Python Tool Checks NPM Packages For Manifest Confusion Issues
A security researcher and sysadmin created a tool to detect manifest mismatches in NPM JavaScript packages. “Manifest confusion” is a security issue in NPM where the package’s manifest data differs between the NPM registry and the ‘package.json’ file, potentially leading to malware or script execution during installation. The inconsistency allows malicious actors to hide scripts or dependencies in the ‘package.json’ file while removing them from the NPM registry. This poses risks like cache poisoning, unknown dependencies, and downgrade attacks. While GitHub hasn’t addressed the problem yet, users can use a Python-based tool by sysadmin Felix Pankratz. By installing the required packages and passing the package’s name as an argument, developers can detect mismatches in version, dependencies, scripts, and package name. Multiple packages can be checked by adding them to a file and using a wrapper script. Understanding the tool’s usage is possible through the help command. Although not widespread, manifest confusion should not be ignored to prevent potential supply-chain attacks.
4. Hackers Exploiting Unpatched WordPress Plugin Flaw to Create Secret Admin Accounts
Around 200,000 WordPress websites are under ongoing attack due to a critical unpatched vulnerability in the Ultimate Member plugin. The vulnerability (CVE-2023-3460) affects all versions, including the latest one released on June 29, 2023. Exploiting the flaw allows unauthenticated attackers to create new user accounts with administrative privileges, granting them complete control over targeted sites. The issue stems from inadequate blocklist logic, enabling attackers to modify the wp_capabilities user meta value and gain full access. Although partial fixes have been released, they are insufficient, and the vulnerability is actively exploitable. Attackers are adding rogue administrator accounts to affected sites, uploading malicious plugins and themes. Users are advised to disable the plugin and conduct audits to identify unauthorized accounts until a comprehensive patch is available.
5. Cybercriminals Hijacking Vulnerable SSH Servers in New Proxyjacking Campaign
An active financially motivated campaign is exploiting vulnerable SSH servers to create a covert proxy network. Attackers use SSH for remote access, running malicious scripts that enlist victim servers into a peer-to-peer (P2P) proxy network. This proxyjacking technique allows threat actors to utilize the victim’s unused bandwidth for various services, providing them with reduced resource load and increased stealth compared to cryptojacking. The campaign aims to breach susceptible SSH servers, deploying an obfuscated Bash script that fetches dependencies from a compromised web server. The script terminates competing bandwidth-sharing programs and launches Docker services to profit from the victim’s bandwidth. The attackers also host a cryptocurrency miner on the web server, indicating involvement in both cryptojacking and proxyjacking attacks. The use of proxyware services adds anonymity but can be abused to obfuscate the source of attacks.
6. Hackers exploit zero-day in Ultimate Member WordPress plugin with 200K installs
Hackers are exploiting a zero-day privilege escalation vulnerability in the ‘Ultimate Member’ WordPress plugin to compromise websites by registering rogue administrator accounts. The flaw, tracked as CVE-2023-3460, affects all versions of the plugin, including the latest one (v2.6.6). While attempts have been made to fix the vulnerability in previous versions, the issue remains exploitable. The attacks were discovered by Wordfence, who found that threat actors exploit the flaw by manipulating the plugin’s registration forms. By setting specific user meta values, attackers can grant themselves administrator access to the targeted site. Indicators of hacked WordPress sites include the appearance of new administrator accounts, usage of specific usernames, access records from known malicious IPs, and the installation of new plugins and themes. Users are advised to update to version 2.6.6 and remain vigilant for security updates.