Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/26/2019
05:35 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Mass Exploitation of vBulletin Flaw Raises Alarm

The remote code execution bug was a 0-day when it was publicly disclosed Monday, but has now been patched.

Concerns are high over widespread attacks targeting a newly disclosed remotely exploitable vulnerability in the popular vBulletin online forum app even though a patch for the flaw is now available.

The vulnerability—a zero-day threat when it was first disclosed Monday—affects 5.x versions of vBulletin. It gives unauthenticated attackers a way to remotely execute any command that the legitimate administrator of the underlying server would be able to execute.

The flaw, which been assigned a critical severity rating of 9.8 in the National Vulnerability Database, lets attackers potentially take complete control of a host system and use the access to drop malware, move laterally, steal data, and carry out other malicious activities.

An anonymous security researcher disclosed the vulnerability and code for exploiting it on Monday without apparently informing vBulletin about it first. The researcher also published so-called Google Dorks, search strings that allow attackers to quickly search for servers running vulnerable versions of the bulletin board app.

vBulletin, which powers online forums on tens of thousands of sites around the world including some well-known companies such as Sony, NASA, EA, and Zynga, released a patch for the flaw late Wednesday.

But already there have been several reports of the flaw being attacked in the wild. In a report Thursday, security vendor Imperva said that it first observed attempts to exploit the issue just hours after the vulnerability was disclosed. The security vendor said that, as of Thursday morning, it had detected over 10,000 attempts to exploit the vBulletin flaw in the wild. Scripts have become available that allow attackers to search for vulnerable versions of the software in automated fashion.

"The vulnerability exists where URL parameters are passed to a widget file within the forum software itself," Imperva said. "These parameters are then parsed on the server without any security checks – the malicious attacker can then inject commands and is able to remotely execute code on the application server."

One researcher—Chaouki  Bekrar, founder and CEO of Zerodium, a company that purchases zero-day bugs—said his company has known about the bug for at least three years. In a tweet, he described the flaw as a backdoor and a perfect candidate for the Pwnie Awards 2020.

A Drop-Everything-Kind-of-Threat

Tenable, which conducted an independent analysis of the threat Wednesday, described the issue as a "drop everything" kind of threat that merited immediate attention. The company said it had tested and confirmed that the publicly available exploit works on default configurations of vBulletin and allows attackers to execute remote commands on host systems.

Ryan Seguin, research engineer at Tenable, says the flaw allows remote attackers to do anything that the vBulletin admin can. "More seriously, vBulletin can run shell scripts on its host," he says. "If the vBulletin service account isn't locked down, then an attacker has a foothold on your network. Once that happens, your whole organization is likely going to get infected with ransomware or hijacked."

Concerns are especially high because the vulnerability is extremely easy to exploit. The simple exploit code that was publicly posted is all that is needed to take full control of all vulnerable 5.x versions of vBulletin, Seguin says.

An attacker could do a simple Shodan search for vulnerable vBulletin servers and hit them with the script. "The server will respond in JSON format with whatever command the attacker attempted to run," he says.

An attacker can pull specific files on the target to get a complete list of all user accounts on the Linux host, he adds. 

Ilia Kolochenko, founder and CEO of Web security firm ImmuniWeb, says the vBulletin flaw is likely to trigger numerous automated hacking and Web server back-dooring campaigns.

"Attackers can take full control of the Web server on which the vulnerable forum is located and potentially expand their control to all the interconnected systems in the network," he cautions.

Criminals might try to reuse admin and user passwords on other systems. Or they could try and conduct sophisticated spear-phishing campaigns against forum users or infect forum pages with malware and compromise the systems of those using those forums.

"Many cyber gangs will not miss such a windfall and pass by such low-hanging fruit," Kolochenko says. Many groups are fully equipped to launch mass exploitation campaigns within minutes of a zero-day public disclosure. "There are cybergangs that sell lists of global websites running specific Web software. All they need to do is to buy a recent list, adopt the exploit and start getting Web shells."

Related Content:

 

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32606
PUBLISHED: 2021-05-11
In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)
CVE-2021-3504
PUBLISHED: 2021-05-11
A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to...
CVE-2021-20309
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to ...
CVE-2021-20310
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero ConvertXYZToJzazbz() of MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this...
CVE-2021-20311
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from t...