Article Details
Scrape Timestamp (UTC): 2024-02-06 07:01:12.763
Source: https://thehackernews.com/2024/02/recently-disclosed-ssrf-flaw-in-ivanti.html
Original Article Text
Click to Toggle View
Recent SSRF Flaw in Ivanti VPN Products Undergoes Mass Exploitation. A recently disclosed server-side request forgery (SSRF) vulnerability impacting Ivanti Connect Secure and Policy Secure products has come under mass exploitation. The Shadowserver Foundation said it observed exploitation attempts originating from more than 170 unique IP addresses that aim to establish a reverse shell, among others. The attacks exploit CVE-2024-21893 (CVSS score: 8.2), an SSRF flaw in the SAML component of Ivanti Connect Secure, Policy Secure, and Neurons for ZTA that allows an attacker to access otherwise restricted resources without authentication. Ivanti had previously divulged that the vulnerability had been exploited in targeted attacks aimed at a "limited number of customers," but cautioned the status quo could change post public disclosure. That's exactly what appears to have happened, especially following the release of a proof-of-concept (PoC) exploit by cybersecurity firm Rapid7 last week. The PoC involves fashioning an exploit chain that combines CVE-2024-21893 with CVE-2024-21887, a previously patched command injection flaw, to achieve unauthenticated remote code execution. It's worth noting here that CVE-2024-21893 is an alias for CVE-2023-36661 (CVSS score: 7.5), an SSRF vulnerability present in the open-source Shibboleth XMLTooling library. It was fixed by the maintainers in June 2023 with the release of version 3.2.4. Security researcher Will Dormann further pointed out other out-of-date open-source components used by Ivanti VPN appliances, such as curl 7.19.7, openssl 1.0.2n-fips, perl 5.6.1, psql 9.6.14, cabextract 0.5, ssh 5.3p1, and unzip 6.00, thus opening the door for more attacks. The development comes as threat actors have found a way to bypass Ivanti's initial mitigation, prompting the Utah-based company to release a second mitigation file. As of February 1, 2024, it has begun releasing official patches to address all the vulnerabilities. Last week, Google-owned Mandiant revealed that several threat actors are leveraging CVE-2023-46805 and CVE-2024-21887 to deploy an array of custom web shells tracked as BUSHWALK, CHAINLINE, FRAMESTING, and LIGHTWIRE. Palo Alto Networks Unit 42 said it observed 28,474 exposed instances of Ivanti Connect Secure and Policy Secure in 145 countries between January 26 and 30, 2024, with 610 compromised instances detected in 44 countries as of January 23, 2024. ⚡ Free Risk Assessment from Vanta Generate a gap assessment of your security and compliance posture, discover shadow IT, and more.
Daily Brief Summary
A server-side request forgery (SSRF) vulnerability in Ivanti VPN products is being exploited en masse following public disclosure.
Security researchers observed more than 170 unique IP addresses attempting to exploit CVE-2024-21893 to establish a reverse shell.
The SSRF flaw, also known as CVE-2023-36661, had been previously fixed in the Shibboleth XMLTooling library in June 2023.
Ivanti has released official patches after their initial mitigation was bypassed by attackers.
A proof-of-concept exploit released by Rapid7 highlighted the combination of this vulnerability with another to execute remote code without authentication.
The SSRF flaw's mass exploitation began after the vulnerability details became public and a PoC exploit was made available.
Ivanti VPN appliances are reported to have outdated components, posing additional security risks.
Numerous instances (28,474) of Ivanti Connect Secure and Policy Secure were found to be exposed globally, with 610 confirmed compromises.