SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
Scans/Exploit Attempts for Atlassian Confluence RCE Vulnerability CVE-2023-22527
Published: 2024-01-22
Last Updated: 2024-01-22 15:20:40 UTC
by Johannes Ullrich (Version: 1)
Last week (January 16th), Atlassian released its January 2024 Security Bulletin. Included with the bulletin was a patch for CVE-2023-22527, a remote code execution vulnerability in Confluence Data Center and Confluence Server. Atlassian assigned a CVSS score of 10.0 to the vulnerability. Exploitation does not require authentication.
The update fixed a template injection vulnerability. Similar vulnerabilities have been patched in Atlassian products in the past. Confluence, like most (all?) Atlassian products are written in Java. Java, particularly the Struts framework, uses OGNL (Object-Graph Navigation Language) to represent Java objects. An attacker able to inject an arbitrary OGNL object can execute Java code.
Yesterday, more details regarding the vulnerability were released, including proof of concept code. The proof of concept code was created by reversing the patch Atlassian had released. The blog post highlighted how the URL can be used to execute arbitrary code.
Following the release of this blog post, we saw an increase in exploit attempts in our honeypots. For example...
Read the full entry: https://isc.sans.edu/diary/ScansExploit+Attempts+for+Atlassian+Confluence+RCE+Vulnerability+CVE202322527/30576/
Update on Atlassian Exploit Activity
Published: 2024-01-23
Last Updated: 2024-01-23 16:06:49 UTC
by Johannes Ullrich (Version: 1)
Exploit activity against Atlassian Confluence servers has exploded since we first discussed it yesterday. The combination of a simple-to-exploit vulnerability and a potential set of high-value targets makes this an ideal vulnerability for many attackers.
It is questionable how many high-value targets are vulnerable. Most organizations have migrated to the Atlassian cloud offerings and do not host tools like Confluence on premises.
One of the first IPs we saw exploit the vulnerability was 38.150.12.131. This IP address started with a simple "cat /etc/shadow" style exploit, likely testing exploitability.
Read the full entry: https://isc.sans.edu/diary/Update+on+Atlassian+Exploit+Activity/30582/
More Scans for Ivanti Connect "Secure" VPN. Exploits Public
Published: 2024-01-18
Last Updated: 2024-01-18 13:54:31 UTC
by Johannes Ullrich (Version: 1)
Exploits around the Ivanti Connect "Secure" VPN appliance, taking advantage of CVE-2023-46805, continue evolving. Late on Tuesday, more details became public, particularly the blog post by Rapid7 explaining the underlying vulnerability in depth [1]. Rapid7 also does a good job walking you through how Ivanti obfuscates the LUKS key in its appliance. This will make it easier for security researchers to inspect the code, hopefully pointing out additional vulnerabilities to Ivanti in the future. In other words, get ready for more Ivanti exploits, and hopefully patches, this year.
Currently, we do see two specific URLs in our honeypots that match Rapid7's analysis...
Read the full entry: https://isc.sans.edu/diary/More+Scans+for+Ivanti+Connect+Secure+VPN+Exploits+Public/30568/
How Bad User Interfaces Make Security Tools Harmful (2024.01.24)
https://isc.sans.edu/diary/How+Bad+User+Interfaces+Make+Security+Tools+Harmful/30586/
Apple Updates Everything - New 0 Day in WebKit (2024.01.22)
https://isc.sans.edu/diary/Apple+Updates+Everything+New+0+Day+in+WebKit/30578/
macOS Python Script Replacing Wallet Applications with Rogue Apps (2024.01.19)
https://isc.sans.edu/diary/macOS+Python+Script+Replacing+Wallet+Applications+with+Rogue+Apps/30572/
CVE-2023-46805-Authentication-Bypass-
CVE-2023-46805-Authentication-Bypass-
*********** Sponsored By SANS *********** SANS CTI Summit Solutions Track 2024 kicks off on January 30! Tune in as Ismael Valenzuela and industry leaders dive into cutting-edge CTI case studies and specific examples, while highlighting how the integration of AI technologies can provide unprecedented insights and advantages. | Save your seat:
Automating Vulnerability Management with BreachLock | Tune in on Tue, February 27 with Dave Shackleford - For many security operations teams, it’s time to look at continuous scanning and assessment services to help to discover assets, report on vulnerabilities and risk posture, and help coordinate and comminute these risks across a diverse group of teams and stakeholders. | Register now:
A SANS Survey: The Future of Network Security Technology | Join Matt Bromiley and invited guest speakers from Palo Alto Networks on February 28 as they dive into spending habits, priorities, and decision-making processes when it comes to security technology. | Register now:
The results are in for the SANS 2024 Threat Hunting Survey! Join survey authors Josh Lemon and Mathias Fuchs on Wed, March 20 as they reveal the results from this year's survey and take a look at how organizations are changing their proactive hunting activities. Register now to receive the accompanying white paper: