Programmer’s Digest #88
06/20/2024-06/26/2024 Hackers Exploit Multiple WordPress Plugins, Critical RCE Vulnerability, SolarWinds Serv-U Vulnerability And More.
1. Hackers Exploit Multiple WordPress Plugins to Hack Websites & Create Rogue Admin Accounts
The Wordfence Threat Intelligence team discovered a significant security breach involving several WordPress plugins on June 22nd, 2024. The Social Warfare plugin was found with malicious code, prompting further investigation that revealed four additional compromised plugins: Blaze Widget, Wrapper Link Element, Contact Form 7 Multi-Step Addon, and Simply Show Hooks. Wordfence alerted the WordPress plugins team, leading to the delisting of affected plugins. Users should update to patched versions or remove the plugins if no patch exists.
The injected malware creates a new admin user and adds SEO spam. Indicators include server IP 94.156.79.8 and generated usernames Options and PluginAuth. Users should scan for malware, check for unauthorized admin accounts, and follow detailed cleaning guidance on the Wordfence website.
2. Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool
Cybersecurity researchers found a security flaw in the Ollama AI platform, tracked as CVE-2024-37032 and named Probllama by Wiz. This vulnerability, patched in version 0.1.34 on May 7, 2024, could allow remote code execution due to insufficient input validation leading to a path traversal flaw. Attackers could exploit this by sending crafted HTTP requests to the Ollama API server’s “/api/pull” endpoint.
The flaw allows overwriting arbitrary files, potentially enabling code execution by modifying the dynamic linker configuration file. The risk is higher in Docker deployments, where the API server is publicly exposed. Over 1,000 exposed instances were found. The issue highlights the need for securing such services with authentication and middleware.
3. SolarWinds Serv-U Vulnerability Under Attack
A high-severity vulnerability in SolarWinds Serv-U, CVE-2024-28995, is being actively exploited. Disclosed on June 5, this directory traversal flaw allows unauthenticated attackers to read sensitive files. It has a CVSS score of 8.6. SolarWinds urged users to update to Serv-U 15.4.2 HF 2.
Following a proof-of-concept exploit on June 13, the Centre for Cybersecurity Belgium (CCB) confirmed active exploitation and issued a warning on X, urging immediate updates. The vulnerability, although easy to exploit, does not allow file changes, which kept its CVSS score at 8.6. Monitoring and detection tools are recommended for previously compromised systems.
4. Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
Cybersecurity researchers disclosed a patched security flaw in Phoenix SecureCore UEFI firmware affecting Intel Core processors. Known as CVE-2024-0762 (CVSS score: 7.5), this “UEFIcanhazbufferoverflow” vulnerability involves a buffer overflow in the TPM configuration, allowing local attackers to execute malicious code and escalate privileges within UEFI firmware.
Eclypsium highlighted the risk of ongoing persistence and evasion of security measures due to this low-level exploitation. Phoenix Technologies addressed the issue in April 2024, and Lenovo released updates last month. The flaw affects Intel families including Alder Lake, Coffee Lake, and more.
UEFI firmware, critical for hardware initialization and OS booting, is a prime target for attackers due to its high-level privileges.
5. How to fix a ReDoS
Although some ReDoS vulnerabilities can be very serious (particularly when they’re server-side and enable an untrusted remote attacker to DOS the server), very often they land much closer to the “annoying” end of the CVSS rating scale: not particularly serious, but easy to create by accident, obscure to understand, and sometimes tricky to fix.
The most annoying thing about ReDoS vulnerabilities is that they’re not caused by careless coding, but by an obscure edge-case in the regex engine.
Code scanning detects ReDoS vulnerabilities automatically, but fixing them isn’t always easy. This blog post describes a 4-step strategy for fixing ReDoS bugs.
6. How To Protect Web Services with OpenIG
Securing web services is critical part of production environment to prevent compromising application from attacks. In microservice architecture, there is no need to implement security for each microservice. Each microservice should be responsible for its atomic functionality. To protect services you need to user API Gateway application. Consider how to protect simple web service with Open Identity Gateway (OpenIG) in this article.