Prime: 1 is a challenging boot2root machine created by Suraj Pandey. It is designed for those who are preparing for the OSCP exam and is a great way to practice your penetration testing skills. In this blog post, I will walk you through the steps I took to root the machine, including: Performing a port [β¦]
Recently, My focus turned more towards OSCP and I am thinking of taking the exam. After reading tons of peopleβs experience over Reddit, I took some notes on what would be my way of studying for this. It isnβt easy from the looks of it and to win with time, I need a lot of [β¦]
This article is a walkthrough for Empire LupinOne vulnerable machine. You can download this from vulnhub. The vulnerable machine is full of fuzzing and escalation of privileges by exploiting Python libraries with SUID being setup. Letβs look into exploiting this: Requirements: 1. Vmware/Virtual Box < This is to run the vulnerable machine. 2. Download LupinOne [β¦]
Recently, My focus turned more towards OSCP and I am thinking of taking the exam. After reading tons of peopleβs experience over Reddit, I took some notes on what would be my way of studying
This article is a walkthrough for Empire LupinOne vulnerable machine. You can download this from vulnhub. The vulnerable machine is full of fuzzing and escalation of privileges by exploiting Python libraries with SUID being setup.
Pwned vulnhub challenge is an easy boot2root machine. One of the key take away from this machine is how you can escalate your privileges using Dockers. This blog post is about how I exploited this
Security is too often an afterthought in the software development process. Itβs easy to understand why: Application and software developers are tasked with getting rid of bugs and adding in new features in updates that must meet a grueling release schedule.Β
Asking to include security testing before an update is deployed can bring up problems needing to be fixed. In an already tight timeline, that creates tension between developers and the security team.Β
If youβre using traditional pentesting methods, the delays and disruption are too great to burden the development team, who are likely working a continuous integration and continuous delivery process (CI/CD). Or if youβre using an automatic scanner to detect potential vulnerabilities, youβre receiving a long list of low-level vulns that obscures the most critical issues to address first.Β
Instead, continuous pentesting, or even scanning for a particular CVE, can harmonize development and security teams. And itβs increasingly important. A shocking 85% of commercial apps contain at least one critical vulnerability, according to a 2021 report, while 100% use open-source software, such as the now infamous Log4j. Thatβs not to knock on open-source software, but rather to say that a critical vulnerability can pop up at any time and itβs more likely to happen than not.Β
If a critical vulnerability is foundβor worse, exploitedβthe potential fines or settlement from a data breach could be astronomical. In the latest data breach settlement, T-Mobile agreed to pay $350 million to customers in a class action lawsuit and invest additional $150 million in their data security operations.
This is why many companies are hiring for development security operations (DevSecOps). The people in these roles work in concert with the development team to build a secure software development process into the existing deployment schedule. But with 700,000 infosec positions sitting open in the United States, it might be hard to find the right candidate.Β
If you want to improve the security of your software and app development, here are some tips from Synack customers:Β
Highlight only the most critical vulns to the dev team. The development team has time only to address whatβs most important. Sorting through an endless list of vulns that might never be exploited wonβt work. Synack delivers vulnerabilities that matter by incentivizing our researchers to focus on finding severe vulnerabilities.
Donβt shame, celebrate. Mistakes are inevitable. Instead of shaming or blaming the development team for a security flaw, cheer on the wins. Finding and fixing vulnerabilities before an update is released is a cause for celebration. Working together to protect the companyβs reputation and your customersβ data is the shared goal.Β
Embrace the pace. CI/CD isnβt going away and the key to deploying more secure apps and software is to find ways to work with developers. When vulns are found to be fixed, document the process for next time. And if thereβs enough time, try testing for specific, relevant CVEs. Synack Red Team (SRT) members document their path to finding and exploiting vulnerabilities and can verify patches were implemented successfully. SRT security researchers can also test as narrow or broad a scope as youβd like with Synackβs testing offerings and catalog of specific checks, such as CVE and zero day checks.
Security is a vital component to all companiesβ IT infrastructure, but it canβt stand in the way of the business. For more information about how Synack can help you integrate security checkpoints in your dev process, request a demo.
A Vulnerability in an Oracle WebLogic Server Allows Attackers to Perform Remote Code Execution via HTTP Request
In this installment of Exploits Explained, weβre going to demonstrate a vulnerability in an Oracle WebLogic Server that allows attackers to perform remote code execution via a single HTTP request.
To see the vulnerability in action, read on, or check out this video walkthrough:
This vulnerability was recently encountered by one of our Synack Red Team researchers during a web application penetration test.Β
Hereβs why this vulnerability is such a big deal:
1. Itβs a Remote Code Execution (RCE) Vulnerability, which is the root cause of many modern Ransomware attacks 2. It affects a widely distributed application 3. Thereβs a public exploit available 4. Itβs not hard to pull off and requires no authentication
While this particular vulnerability has already been patched, weβll walk you through how an attacker would be able to exploit this in the wild.Β
Oracle WebLogic Server sets an auth flag based on URL paths in requests. Attackers were able to determine the allowed paths via the values set in βWebAppSecurityWLS.getConstraint ()β. Β In this attack, the path is set to /css/, and when the web application evaluates the request, it sets the value of βflag unrestrictβΒ to true. This allows the request to be passed along unauthenticated. The attacker then utilizes the path traversal to access the console.portal endpoint.
The console.portal portion of the web application can use a constructor called ShellSession.exec () which allows for system commands on both Linux and Windows systems.
These commands are sent via an MVEL expression under the handle βcom.tangosol.coherence.mvel2.sh.ShellSessionβIn the publicly available exploit, the MVEL expression contains a function to evaluate the value of an HTTP header value named cmd and uses this value for the command to be executed. As seen here:
The output of the command is then written into the serverβs response where the attacker can see the results of the command sent.
The serverβs response for the commands whoami and ipconfig can be seen here:
This was patched in the October 2020 Critical Patch Update or CPU. These are some of the affected versions:
Organizations running these versions of Oralce WebLogic Server should review logs for HTTP requests made to the console.portal endpoint or any requests containing the double url encoded value for ../ (%252E%252E%252F)
Organizations should also check for any suspicious processes spawned by the application. This typically includes cmd.exe ( for windows) or /bin/sh (for *nix systems).
Itβs critical that organizations check to make sure they canβt be compromised by this vulnerability by performing penetration testing. We recommend taking a crowdsourced penetration testing approach for higher quality results and to achieve a true adversarial perspective.Β
Stay tuned to the Exploits Explained series for further walkthroughs of vulnerabilities encountered by the SRT in the field.Β