SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
June 2023 Microsoft Patch Tuesday
Published: 2023-06-13
Last Updated: 2023-06-13 18:30:28 UTC
by Johannes Ullrich (Version: 1)
Today's Microsoft patch Tuesday addresses 94 vulnerabilities. This includes 14 Chromium vulnerabilities patched in Microsoft Edge, and five GitHub vulnerabilities. Six of these vulnerabilities are rated as critical.
Three critical vulnerabilities are remote code execution vulnerabilities related to the Windows Pragmatic Multicast (PGM) service. Past PGM vulnerabilities were related to the Microsoft Message Queue (MSMQ), for example, CVE-2023-28250, which was patched in April.
Two of the important vulnerabilities are caused by Microsoft Exchange. Exploitation requires authentication, so these remote code execution vulnerabilities are only regarded as important. But based on history with similar flaws, this issue is worth watching.
A critical vulnerability patched in Sharepoint allows the spoofing of JWT authentication tokens to gain access as an authenticated user.
This month, none of the vulnerabilities were made public before patch Tuesday, and none of them are already exploited.
Read the full entry: https://isc.sans.edu/diary/June+2023+Microsoft+Patch+Tuesday/29942/
Geoserver Attack Details: More Cryptominers against Unconfigured WebApps
Published: 2023-06-12
Last Updated: 2023-06-12 12:46:13 UTC
by Johannes Ullrich (Version: 1)
Last week, I noted increased scans against "GeoServer." GeoServer is an open-source Java application with a simple web-based interface to share geospatial data like maps.
I followed our usual playbook of redirecting these scans to an instance of GeoServer. Geoserver had a few vulnerabilities in the past. I installed an older version of GeoServer to verify if the vulnerability was exploited. However, it looks like a vulnerability wasn't necessary. Instead, similar to what we have seen with NiFi recently, the attacker is just using a built-in code execution feature, and the default install, as deployed by me, did not require credentials.
GeoServer was installed in a docker container, which prevented any actual execution of the attack code. The container did not provide tools like curl to download additional payload. Instead, I downloaded the payloads later manually.
Soon after I configured the honeypot, several exploit requests arrived from 109.237.96.251. These requests took advantage of the Web Processing Server (WPS).
Read the full entry: https://isc.sans.edu/diary/Geoserver+Attack+Details+More+Cryptominers+against+Unconfigured+WebApps/29936/
Undetected PowerShell Backdoor Disguised as a Profile File
Published: 2023-06-09
Last Updated: 2023-06-09 08:05:43 UTC
by Xavier Mertens (Version: 1)
PowerShell remains an excellent way to compromise computers. Many PowerShell scripts found in the wild are usually obfuscated. Most of the time, this helps to have the script detected by fewer antivirus vendors. Yesterday, I found a script that scored 0/59 on VT! Let’s have a look at it.
The file was found with the name « Microsoft.PowerShell_profile.ps1 ». The attacker nicely selected this name because this is a familiar name used by Microsoft to manage PowerShell profiles. You may compare this to the « .bashrc » on Linux. It’s a way to customize your environment. Everything you launch a PowerShell, it will look for several locations, and if a file is found, it will execute it. Note that it’s also an excellent way to implement persistence because the malicious code will be re-executed every time a new PowerShell is launched. It’s listed as T1546.013[2] in the MITRE framework.
Let’s reverse the script (SHA256: a3d265a0ab00466aab978d0ccf94bb48808861b528603bddead6649eea7c0d16). When opened in a text editor, we can see that it is heavily obfuscated...
Read the full entry: https://isc.sans.edu/diary/Undetected+PowerShell+Backdoor+Disguised+as+a+Profile+File/29930/
Deobfuscating a VBS Script With Custom Encoding (2023.06.14)
https://isc.sans.edu/diary/Deobfuscating+a+VBS+Script+With+Custom+Encoding/29940/
DShield Honeypot Activity for May 2023 (2023.06.11)
https://isc.sans.edu/diary/DShield+Honeypot+Activity+for+May+2023/29932/
Ongoing scans for Geoserver (2023.06.08)
https://isc.sans.edu/diary/Ongoing+scans+for+Geoserver/29926/
Product: Totolink X5000RCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-31569NVD References: - http://totolink.com- https://github.com/JeeseenSec/Report/tree/main/TOTOLINK,Thanks- https://github.com/JeeseenSec/Report/tree/main/TOTOLINK/CVE-2023-31569- https://www.totolink.net/home/menu/newstpl/menu_newstpl/products/id/218.htmlCVE-2023-33532 - The Netgear R6250 router with Firmware Version 1.0.4.48 has a command injection vulnerability, allowing an attacker with web management privileges to gain shell privileges via post request parameter injection.Product: Netgear R6250CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-33532NVD References: - http://netgear.com- https://github.com/D2y6p/CVE/blob/main/Netgear/CVE-2023-33532/Netgear_R6250_RCE.pdfCVE-2023-32550 - Landscape's server-status page exposes sensitive system information through GET requests, allowing for potential attackers to exploit and access further information from the API.Product: Landscape APICVSS Score: 9.3NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-32550NVD References: https://bugs.launchpad.net/landscape/+bug/1929037CVE-2023-34111 - The github repo Taosdata/grafanaplugin's `Release PR Merged` workflow has a command injection vulnerability allowing for arbitrary code execution within the github action context.Product: TDengine Grafana PluginCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-34111NVD References: - https://github.com/taosdata/grafanaplugin/blob/master/.github/workflows/release-pr-merged.yaml#L25- https://github.com/taosdata/grafanaplugin/security/advisories/GHSA-23wp-p848-hcgr- https://securitylab.github.com/research/github-actions-untrusted-input/CVE-2023-29632 - PrestaShop jmspagebuilder 3.x is vulnerable to SQL Injection via ajax_jmspagebuilder.php.Product: Joommasters JmspagebuilderCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-29632NVD References: https://friends-of-presta.github.io/security-advisories/modules/2023/03/13/jmspagebuilder.htmlCVE-2016-15033 - The WordPress Delete All Comments plugin before version 2.1 allows unauthenticated remote code execution via arbitrary file uploads.Product: Delete All Comments Project CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2016-15033NVD References: - http://blog.nintechnet.com/arbitrary-file-upload-vulnerability-in-wordpress-delete-all-comments-plugin/- https://wordpress.org/plugins/delete-all-comments/#developers- https://www.wordfence.com/threat-intel/vulnerabilities/id/b1e98d2d-20b1-4fff-96d4-0fb8e0d2615a?source=cveCVE-2019-25138 - The User Submitted Posts plugin for WordPress allows unauthenticated attackers to upload arbitrary files, leading to possible remote code execution.Product: Plugin-Planet User Submitted PostsCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2019-25138NVD References: - https://blog.nintechnet.com/arbitrary-file-upload-vulnerability-in-wordpress-user-submitted-posts-plugin/- https://wordpress.org/plugins/user-submitted-posts/#developers- https://www.wordfence.com/threat-intel/vulnerabilities/id/5a97877b-fb4d-4e87-bcff-56be65fee6ce?source=cveCVE-2019-25141 - Easy WP SMTP plugin for WordPress <= 1.3.9 allows unauthenticated attackers to inject new admin accounts and modify plugin settings due to missing capability checks and insufficient input validation.Product: Easy WP SMTP plugin for WordPressCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2019-25141NVD References: - https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/- https://plugins.trac.wordpress.org/changeset?old_path=%2Feasy-wp-smtp&old=2052057&new_path=%2Feasy-wp-smtp&new=2052058&sfp_email=&sfph_mail=- https://wordpress.org/support/topic/vulnerability-26/- https://www.wordfence.com/threat-intel/vulnerabilities/id/84b75f7d-7258-46f6-aee6-b96d70bee264?source=cveCVE-2020-36708 - Multiple WordPress themes are vulnerable to function injections, allowing remote code execution, due to epsilon_framework_ajax_action in versions up to and including Shapely <= 1.2.7, NewsMag <= 2.4.1, Activello <= 1.4.0, Illdy <= 2.1.4, Allegiant <= 1.2.2, Newspaper X <= 1.3.1, Pixova Lite <= 2.0.5, Brilliance <= 1.2.7, MedZone Lite <= 1.2.4, Regina Lite <= 2.0.4, Transcend <= 1.1.8, Affluent <= 1.1.0, Bonkers <= 1.0.4, Antreas <= 1.0.2, Sparkling <= 2.4.8, and NatureMag Lite <= 1.0.4.Product: WordPress multiple themesCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2020-36708NVD References: - https://blog.nintechnet.com/unauthenticated-function-injection-vulnerability-fixed-in-15-wordpress-themes/- https://blog.nintechnet.com/unauthenticated-function-injection-vulnerability-in-wordpress-sparkling-theme/- https://wpscan.com/vulnerability/bec52a5b-c892-4763-a962-05da7100eca5- https://www.wordfence.com/blog/2020/11/large-scale-attacks-target-epsilon-framework-themes/- https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=cveCVE-2020-36713 - The…
*********** Sponsored By Vulcan Cyber ***********Vulnerability debt out of control? Get Vulcan Free, the only free vulnerability risk aggregation and prioritization tool to integrate and normalize your vulnerability scan, CSPM, DAST/SAST, CMDB and asset data. Companies using Vulcan Free experience a 90% reduction in critical and high vulnerabilities and a 90% increase in risk mitigation SLA adherence. Get started in minutes, connect your tools and own your vulnerability risk for free. | GET VULCAN FREE:
Tune in on Tuesday, June 20 at 3:30pm ET for our upcoming webcast: The Future of Risk-Based Detection - Joined by SOC experts, this webcast will discuss how to incorporate risk-based detection to reduce noise and quickly respond when time is a limiting factor. | Register now:
Join SANS Instructor Chris Edmundson on Thursday, June 22 at 1:00pm ET as he kicks off our upcoming webcast: Protecting CI/CD Pipelines - Growing Threats and the Keys to Securing Them | Register now:
Take the SANS Network Security in the Hybrid Cloud Era Survey to share your insights about network security and you'll be entered into our drawing for a chance to win a $250 Amazon gift card | Take the survey: