Casa > cibernético Notícias > CVE-2018-11776 Proof-of-Concept Published on GitHub
CYBER NEWS

CVE-2018-11776 Proof-of-Concept Publicado no GitHub

Semana passada, nós relatado about CVE-2018-11776, uma nova vulnerabilidade altamente crítica residente em funcionalidade principal do Apache Strut, Também descrito como uma vulnerabilidade de execução remota de código que afeta todas as versões do Apache Struts 2. The flaw is located in the open source Web framework, and according to security experts, it could exceed the damage we witnessed last year during the Equifax breach.




Infelizmente, a Proof-of-Concept (PoC) exploit for CVE-2018-11776 has appeared on GitHub, alongside a Python script that enables easy exploitation, Recorded Future researchers just reported.

What Does a Working CVE-2018-11776 PoC Mean?

Em primeiro lugar, researchers say that there have been talks about exploitation of the new Struts vulnerability on a variety of Chinese and Russian underground forums. Como explicado by the security experts:

Apache Struts is a very popular Java framework and there are potentially hundreds of millions of vulnerable systems that could be exploited by this flaw. The challenge is in identifying how many systems are vulnerable. Because many of the servers running Apache Struts are backend application servers, they are not always easily identified, even by the system owners.

Contudo, this doesn’t necessarily mean the servers are not publicly accessible by hackers. Na maioria dos casos, scanners will trick servers into returning a Java stack trace as a way of identifying potential Struts servers. But other tricks are also possible such as looking for specific files or directories.

além disso, a new Struts vulnerability appears to be easier to exploit because it doesn’t require the Apache Struts installation to have any additional plugins running for the exploit to take place, os pesquisadores acrescentaram.

The researchers also warned that if the CVE-2018-11776 PoC published on GitHub is indeed a fully functioning one, and companies haven’t patched against it yet, the outcome would be devastating. As to whether the PoC is trustworthy or not, Semmle CEO Oege de Moor [the CEO of the company that discovered the flaw] declined to confirm the nature of the PoC. What he said however is that if it is a working PoC, hackers now have a quicker and a very effective way into an enterprise.

The good news is that if an enterprise is unable to update immediately for a number of reasons, there are still ways to mitigate against the exploit, tal como a seguir workaround:

Verify that you have set (and always not forgot to set) namespace (if is applicable) for your all defined results in underlying configurations. Also verify that you have set (and always not forgot to set) value or action for all url tags in your JSPs. Both are needed only when their upper action(s) configurations have no or wildcard namespace.

Milena Dimitrova

Milena Dimitrova

Um escritor inspirado e gerente de conteúdo que está com SensorsTechForum desde o início do projeto. Um profissional com 10+ anos de experiência na criação de conteúdo envolvente. Focada na privacidade do usuário e desenvolvimento de malware, ela acredita fortemente em um mundo onde a segurança cibernética desempenha um papel central. Se o senso comum não faz sentido, ela vai estar lá para tomar notas. Essas notas podem mais tarde se transformar em artigos! Siga Milena @Milenyim

mais Posts

Me siga:
Twitter

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

Compartilhar no Facebook Compartilhar
Carregando...
Compartilhar no Twitter chilrear
Carregando...
Compartilhar no Google Plus Compartilhar
Carregando...
Partilhar no Linkedin Compartilhar
Carregando...
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Carregando...
Partilhar no StumbleUpon Compartilhar
Carregando...