Archive for category Vulnerabilities

REWTERZ THREAT ALERT – New SpeakUp Backdoor Infects Linux and macOS with Miners in East Asia

SEVERITY: Medium

CATEGORY: Emerging Threat

Analysis Summary


The backdoor SpeakUp connects to the command and control (C&C) server upon infection, to register the machine and exploits known vulnerabilities in six different Linux distributions. The initial infection vector is targeting the recently reported vulnerability in ThinkPHP and uses command injection techniques for uploading a PHP shell that serves and executes a Perl backdoor. It begins with exploiting CVE-2018-20062 for uploading a PHP shell by using a GET request. Then this shell executes commands sent via the “module” parameter in a query.

SpeakUp uses POST and GET requests over HTTP to communicate with its main C&C which is the compromised website of speakupomaha[.]com. The first POST packet sends a victim ID and more introductory information such as the current version of the installed script. SpeakUp also equips its backdoors with i (sic), a python script which allows the backdoor to scan and infect more Linux servers within its internal and external subnets. Apart from Brute Forcing other potential victims in the local network, the threat actors try to exploit the following Remote Code Execution vulnerabilities in the targeted servers:

a) CVE-2012-0874: JBoss Enterprise Application Platform Multiple Security Bypass Vulnerabilities

b) CVE-2010-1871: JBoss Seam Framework remote code execution

c) JBoss AS 3/4/5/6: Remote Command Execution (exploit)

d) CVE-2017-10271: Oracle WebLogic wls-wsat Component Deserialization RCE

e) CVE-2018-2894: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware.

f) Hadoop YARN ResourceManager – Command Execution (exploit)

g) CVE-2016-3088: Apache ActiveMQ Fileserver File Upload Remote Code Execution Vulnerability.

A successful exploitation of one of the vulnerabilities will result in deploying the original ibus script on the exploited server. It has the ability to scan the surrounding network of an infected server and distribute the malware.

Impact


Code Execution

Mining of Cryptocurrency

Affected Products

Linux

MacOS

Indicators of Compromise


IP(s) / Hostname(s)



  • 67[.]209.177.163
  • 173[.]82.104.196
  • 5[.]196.70.86
  • 120[.]79.247.183
  • 5[.]2.73.127/lnsqqFE2jK/pprtnp153WWW.php
  • Speakupomaha[.]com/misc/ui/images/Indxe.php
  • Linuxservers[.]000webhostapp[.]com/hp.html linuxsrv134[.]xp3[.]biz

URLs

speakupomaha[.]com.

Malware Hash (MD5/SHA1/SH256)

  • 0a4e5831a2d3115acb3e989f0f660a6f
  • 0b5e1eb67be7c3020610b321f68375c1
  • 968d1906be7eb8321a3afac5fde77467
  • 074d7a4417d55334952d264c0345d885
  • f357f32d7c2ddfef4b5850e7506c532b
  • b6311bffcea117dceac5ccac0a243ae5
  • 2adf4e4512aaafab75e8411aa7121ffa
  • a73c7b777d31b0a8ef270809e2ed6510
  • 114cda60d215e44baeef22b7db0c64d5
  • 8f725fc5406ebf679c5c7ade3e8d5f70
  • 4a80a075c7c6b5e738a7f4b60b7b101f
  • e18749e404baec2aa29f4af001164d1b
  • 1a377b5d5d2162327f0706cc84427780
  • 1da94e156609d7e880c413a124bad004
  • 713260a53eff05ad44aad8d6899f1c6e
  • 36cda3c77ba380d6388a01aafcbaa6c7
  • 0f83482368343f5c811bac84a395d2c0
  • 8dd6cb5f33d25512805c70bd3db5f433
  • e4ca1e857034cbe0428d431c15ec8608
  • 36502273cee61825dc97d62a3dffe729
  • f16c5a6342ccc253b1de177d3fa310b1
  • 08d7674532cc226931570e6a99d5ba30
  • 279c4aa955085480f3ad0c19aa36a93b
  • f79be3df4cbfe81028040796733ab07f
  • a21a3d782d30b51515834a7bf68adc8e
  • c572a10ca12f3bd9783c6d576aa080fb
  • b60ec230644b740ca4dd6fd45059a4be
  • 5e6b6fcd7913ae4917b0cdb0f09bf539
  • ae875c496535be196449547a15205883
  • 068d424a1db93ec0c1f90f5e501449a3
  • 996e0c8190880c8bf1b8ffb0826cf30f

Remediation

  • Make sure to update all Linux distributions to a patched version against above-mentioned vulnerabilities.
  • Block the threat indicators at their respective controls.
  • Ensure close monitoring of all internal and external communications as well as activities within the network.




REWTERZ THREAT ALERT -Reverse RDP Attacks by Major Protocol Issues

SEVERITY: Medium

CATEGORY: Vulnerability

Analysis Summary


A total of 25 security flaws are discovered in the popular implementations of the Remote Desktop Protocol (RDP) which can allow bad actors to take control of computers connecting to a malicious server using remote code execution and memory corruption. The flaws allow a malicious actor to reverse the usual direction of communication and infect the IT professional or security researcher’s computer. Such an infection could then allow for an intrusion into the IT/local network as a whole.

16 major vulnerabilities are in the open source FreeRDP RDP client and its fork rdesktop, as well as in Microsoft’s own RDP client implementation. Open source xrdp RDP server is partially based on rdesktop and hence is vulnerable to the same vulnerabilities.

1.8.3 version of the rdesktop RDP client contains 11 vulnerabilities with a major security impact, and 19 vulnerabilities overall in the library. FreeRDP 2.0.0-rc3 contains five vulnerabilities with major security impact and six vulnerabilities overall in the library. (The RDP client NeutrinoRDP is a fork of an older version (1.0.1) of ‘FreeRDP’ and therefore probably suffers from the same vulnerabilities.)

RDP Clients may also be vulnerable to a path-traversal attack, allowing the server to drop arbitrary files in arbitrary paths on the client’s computer.

Impact

  • Memory Corruption
  • Code Execution
  • System Access
  • Network-wide infection

Affected Products

  • mstsc.exe
  • FreeRDP
  • rdesktop

Remediation

  • If you are using rdesktop or FreeRDP, update to the latest version which includes the relevant patches.
  • When using Microsoft RDP client (MSTSC), we strongly recommend disabling bi-directional clipboard sharing over RDP.
  • Apply security measures to both the clients and the servers involved in the RDP communication.
  • Users should avoid using RDP to connect to remote servers that have not implemented sufficient security measures.


REWTERZ THREAT Advisory – LibreOffice and OpenOffice Remote Code Execution Vulnerability

SEVERITY: Medium

CATEGORY: Vulnerability

Analysis Summary

By tricking victims into opening an ODT (OpenDocument Text) file embedding an event embedded, it is possible to launch a directory traversal attack executing a python method from a script in any arbitrary file system location. Exploiting CVE-2018-16858, it is possible to trigger the automatic execution of a specific python library included in the suite using a hidden onmouseover event. On further analysis, researchers found out that under certain circumstances it is not only possible to specify the function you want to call inside a python script, but passing parameters is also a possibility.

In the fixed versions, access is restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install.


Impact

Remote Code Execution

Affected Products

LibreOffice

OpenOffice

Remediation


While LibreOffice has been fixed with the release of LibreOffice 6.0.7/6.1.3, update to the fixed versions. OpenOffice is still awaiting a fix. Meanwhile, it is possible to remove or rename the pythonscript.py file in the installation folder to disable the support for python.


Rewterz Threat Advisory – Microsoft Exchange Sever 2013 CU21/ 2019/ 2016 CU11 API call privilege escalation

SEVERITY: High

 

 

CATEGORY: Vulnerability

 

 

ANALYSIS SUMMARY

 

 

Microsoft Exchange could allow a local authenticated attacker to gain elevated privileges on the system, caused by default high privileges in the Active Directory domain. By using an API call, an attacker could exploit this vulnerability to become a Domain Admin and gain elevated privileges on the system. The Exchange Windows Permissions group has WriteDacl access on the domain object in active directory, which enables any member of this group to modify the domain privileges, among which is the privilege to perform DCSync operations.

 

 

 

 

IMPACT

 

 

Privilege Escalation

 

 

AFFECTED PRODUCTS

 

 

  • Microsoft Exchange Server 2013 CU21
  • Microsoft Exchange Server 2019
  • Microsoft Exchange Server 2016 CU11

 

 

REMEDIATION

 

 

Vendor has not released any of the updates for the following vulnerability.


Rewterz Threat Advisory – CVE-2019-2550 & CVE-2019-2549 – Oracle FLEXCUBE Direct Banking “Logoff Page” Vulnerabilities

SEVERITY: High

 

 

ANALYSIS SUMMARY

 

 

Multiple vulnerabilities have been reported in Oracle FLEXCUBE Direct Banking, which can be exploited by malicious people to disclose sensitive information and manipulate certain data.

1) An error within the “Logoff Page” sub-component can be exploited to disclose, update, insert, or delete certain data.

2) Another different error within the “Logoff Page” sub-component can be exploited to update, insert, or delete certain data.

 

 

AFFECTED PRODUCTS

 

 

Oracle FLEXCUBE Direct Banking 12.x

 

 

IMPACT

 

 

  • Exposure of sensitive information
  • Manipulation of data

 

 

REMEDIATION 

 

 

Apply update.

https://support.oracle.com

 

If you think you’re a victim of a cyber-attack, immediately send an email to soc@rewterz.com.


Rewterz Threat Advisory – Oracle Enterprise Manager for Virtualization Multiple Vulnerabilities

SEVERITY: Medium

 

 

ANALYSIS SUMMARY

 

 

CVE-2018-12022

2019-01-17: At the time of this advisory, a description was not available.

 

 

CVE-2018-14721

FasterXML jackson-databind 2.x before 2.9.7 can let remote attackers launch server-side request forgery (SSRF) attacks due to failure to block the axis2-jaxws class from polymorphic de-serialization.

 

 

CVE-2018-11307

2019-01-17: At the time of this advisory, a description was not available.

 

 

CVE-2018-12023

2019-01-17: At the time of this advisory, a description was not available.

 

 

CVE-2018-14718

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.

 

 

CVE-2018-14719

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.

 

 

CVE-2018-14720

FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.

 

 

AFFECTED PRODUCTS

 

 

Oracle Enterprise Manager 13.x

 

 

IMPACT

 

 

Security Bypass

 

 

REMEDIATION 

 

 

Apply update.

https://support.oracle.com/rs?type=doc&id=2466391.1


Copyright © Rewterz. All rights reserved.