blog

Security Vulnerability of the Week 30/05/22

Gitub Leak

Weekly review of the top vulnerability issues of the week

This week we deep dive into Github Leak, F5 Botnet, VMWare, Windows and Linux Vulnerabilities Most vulnerabilities are being explored after the recent discoveries


Appsec

Github

In Mid April Github was attacked and the attacker leveraged the stolen Oauth app tokens issued to heroku and trvis-CI to steal 100000 NPM account Credentials

Github alerted on the 15 April of the attack and has updated the security Blog

We covered the issue in past releases Security Vulnerability of the Week 02/05/22 (updated) and https://phoenix.security/security-vulnerability-of-the-week-09-05-22/

The original List of token being stolen belonged to the following

  • Heroku Dashboard (ID: 145909)
  • Heroku Dashboard (ID: 628778)
  • Heroku Dashboard – Preview (ID: 313468)
  • Heroku Dashboard – Classic (ID: 363831)
  • Travis CI (ID: 9216)

All the vendors after the breach was disclosed forced re-auth and revoked all the OAuth Tokens (GitHubTravis CI, and Heroku) to block further hacking attempts.

Greg Ose, Senior Director for Product Security Engineering at GitHub disclosed on the 27 May the details of the ongoing investigation after an unknown threat actors stole the following data from npm cloud storage:

  • Approximately 100k npm usernames, password hashes, and email addresses from a 2015 archive of user information.
  • All private package manifests and metadata as of April 7, 2021.
  • Names and the semVer of published versions of all private packages as of April 10, 2022.
  • Private packages from two organizations.

Nonetheless recently GitHub has forced 3rd parties and all users to enable 2Factor Authentication (MFA, 2FA)

Attempting to leverage the stolen npm credentials would be automatically blocked by email verification enabled on all accounts since March 1, 2022, if they were not enrolled in 2FA already.

GitHub has reset all passwords belonging to impacted npm users and notifies all organizations and users whose data was accessed by the attacker.

“Following an internal discovery and additional investigation unrelated to the OAuth token attack, GitHub discovered a number of plaintext user credentials for the npm registry that were captured in internal logs following the integration of npm into GitHub logging systems,” Ose added.

“This issue was mitigated and logs containing the plaintext credentials were purged prior to the attack on npm.”

For more details check the message from the Hackernews forum: https://news.ycombinator.com/item?id=31526649

also refer to the blog from Greg Ose to follow the disclosure: https://github.blog/2022-05-26-npm-security-update-oauth-tokens/


INFRA/Network

Windows

Windows and Microsoft Active Directory, ad is strengthening Active Directory is strengthening the posture for account after recent Discoveries of Security team on Azure.

Microsoft introduced in October 2019 the “security defaults” as a mechanism designed to introduce good identity security hygiene with a minimum of effort, even for organizations that don’t have an IT team in Jan 20202. Few months later security defaults were enabled across 60K tenants.

When an administrator setups Security Defaults for tenants the users are asked to enroll for MFA within 14 days

The new security defaults will help protect enterprise user accounts from password spray and phishing attacks by:

  • Requiring all users and admins to register for MFA using the Microsoft Authenticator app.
  • Challenging users with MFA, mostly when they show up on a new device or app, but more often for critical roles and tasks.
  • Disabling authentication from legacy authentication clients that can’t do MFA.
  • Protecting admins by requiring extra authentication every time they sign in.

Linux

There has been increased attention to Windows Subsystem for Linux (WSL); the system was built, as the name mentions to run on windows Linux application that emulates Linux kernel.

Malicious Linux binaries for WSL were first discovered over a year ago, with researchers at Lumen Technologies’ Black Lotus Labs publishing a report on this new type of threat in September 2021.

A more recent attack leveraging the C&C via telegram:  RAT-via-Telegram Bot that allows control over Telegram

Black Lotus Labs warned in the past that threat actors are exploring the WSL vector deeper, even if many of the samples analyzed “did not yet appear to be fully functional due to the use of internal or non-routable IPs.”

The general recommendation for defending against WSL-based threats is to keep a close eye on the system activity (e.g. SysMon) to determine suspicious activity and investigate commands.

Source: https://www.bleepingcomputer.com/

Vmware

New PoC Available for Vmware products to exploit the Authentication Bypass

VMware released security updates to address the CVE-2022-22972 flaw affecting Workspace ONE Access, VMware Identity Manager (vIDM), or vRealize Automation.

The flaw (tracked as CVE-2022-22972) was reported by Bruno López of Innotec Security, who found that it impacts Workspace ONE Access, VMware Identity Manager (vIDM), and vRealize Automation.

Researchers at Horizon3 released a PoC to exploit the vulnerability: proof-of-concept (PoC) exploit for CVE-2022-22972

Note VMware has released a cumulative patch, that addresses more than 28 new vulnerabilities

CVE-2022-22972 is a relatively simple ‘Host’ header manipulation vulnerability. Motivated attackers would not have a hard time developing an exploit for this vulnerability,” Horizon3 added.

“This script can be used by bypassing authentication on vRealize Automation 7.6 using CVE-2022-22972,” the researchers said.

“Workspace ONE and vIDM have different authentication endpoints, but the crux of the vulnerability remains the same.

The complete list of VMware products impacted by these security bugs includes:

  • VMware Workspace ONE Access (Access)
  • VMware Identity Manager (vIDM)
  • VMware vRealize Automation (vRA)
  • VMware Cloud Foundation
  • vRealize Suite Lifecycle Manager

The company goes deeper into the vulnerability in their advisory: “A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate,”

The Cybersecurity and Infrastructure Security Agency (CISA) further highlighted this security flaw’s severity level by issuing a new Emergency Directive that ordered Federal Civilian Executive Branch (FCEB) agencies to urgently update or remove VMware products from their networks.

patch available:

for this version: https://www.vmware.com/security/advisories/VMSA-2022-0014.html detailed under: https://kb.vmware.com/s/article/88438

Workaround:

VMware also provides temporary workarounds for admins who cannot patch their appliances immediately.

The steps detailed here – only one admin should remain, all users should be disabled and log in via SSH to restart the horizon-workspace service.

VMware and F5 weaponization

Vmware and F5 were recently the main highlights on vulnerabilities (covered in https://phoenix.security/security-vulnerability-of-the-week-09-05-22/ and in VmWare advisory: https://www.vmware.com/security/advisories.html )

The botnet recently discovered in March by Securonix originally exploited Fortinet vulnerabilities with the intent of causing Denial of Service (DDoS) attacks.

An update from AT&T Alien Labs notes that the latest variants of EnemyBot incorporate exploits for 24 vulnerabilities

In April most of the flaws related to routers and IoT devices, with CVE-2022-27226 (iRZ) and CVE-2022-25075 (TOTOLINK) and Log4Shell being added

The new Variant adds the following attacks:

  • CVE-2022-22954: Critical (CVSS: 9.8) remote code execution flaw impacting VMware Workspace ONE Access and VMware Identity Manager. PoC (proof of concept) exploit on April 22: https://packetstormsecurity.com/files/166935/VMware-Workspace-ONE-Access-Template-Injection-Command-Execution.html
  • CVE-2022-22947: Remote code execution flaw in Spring, and massively targeted in April with code: https://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html
  • CVE-2022-1388: Critical (CVSS: 9.8) remote code execution flaw F5 big IP, threatening vulnerable endpoints with device takeover. The exploit was active almost immediately Code: https://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html

The group Keksec, behind EnemyBot, is actively developing the malware and has other malicious projects under its belt: Tsunami, Gafgyt, DarkHTTP, DarkIRC, and Necro.

Recommendation:

As always update the system externally facing as soon as possible as the exploits get weaponized quite quickly and systematically exploited with the objective of DDoS and Ransomware

Cloud

Current Year Research on Vulnerabilities Discovered

No alternative text description for this image
Courtesy of Christoper Parisel

For the Deep dive on previous Cloud Vulnerabilities: https://phoenix.security/security-vulnerability-of-the-week-02-04-22/

Here https://phoenix.security/security-vulnerability-of-the-week-09-05-22/

and here https://phoenix.security/security-vulnerability-of-the-week-16-05-22/

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Discover and fix CVE-2024-3094 vulnerability affecting Linux distributions liblzma, part of the xz package, Fedora, openSUSE, Debian, and Kali. Get the latest updates, fixes, and security recommendations to safeguard your system against unauthorized access through compromised XZ Utils. Protect and discover the affected system with ASPM, Application security Posture management
Francesco Cipollone
Discover and fix CVE-2024-3094 vulnerability affecting Linux distributions liblzma, part of the xz package, Fedora, openSUSE, Debian, and Kali. Get the latest updates, fixes, and security recommendations to safeguard your system against unauthorized access through compromised XZ Utils. Protect and discover the affected system with ASPM, Application security Posture management
Francesco Cipollone
Discover and fix CVE-2024-3094 vulnerability affecting Linux distributions liblzma, part of the xz package, Fedora, openSUSE, Debian, and Kali. Get the latest updates, fixes, and security recommendations to safeguard your system against unauthorized access through compromised XZ Utils. Protect and discover the affected system with ASPM, Application security Posture management
Francesco Cipollone
Explore the interplay between the MITRE ATT&CK framework and EPSS for effective vulnerability management. Learn how these tools help predict and prioritize cyber threats, with deep dives into the most and least exploited techniques. Stay ahead in cybersecurity with Phoenix’s advanced analysis.
Francesco Cipollone

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.