SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html From Highly Obfuscated Batch File to XWorm and Redline Published: 2024-08-26. Last Updated: 2024-08-26 07:01:14 UTC by Xavier Mertens (Version: 1) If you follow my diaries, you probably already know that one of my favorite topics around malware is obfuscation. I'm often impressed by the crazy techniques attackers use to make reverse engineers' lives more difficult. Last week, I spotted a file called "crypted.bat" ... which is detected by no antivirus according to VT. It deserved to be investigated! When you open the file in a text editor, you see this ... Read the full entry: https://isc.sans.edu/diary/From+Highly+Obfuscated+Batch+File+to+XWorm+and+Redline/31204/ OpenAI Scans for Honeypots. Artificially Malicious? Action Abuse? Published: 2024-08-22. Last Updated: 2024-08-22 17:01:37 UTC by Johannes Ullrich (Version: 1) For a while now, I have seen scans that contain the pattern <see full ISC Diary entry> in the URL. For example, today this particular URL is popular: /<see full ISC Diary entry>/wp-content/themes/twentytwentyone/style.css I have been ignoring these scans so far. The "wp-content" in the URL suggests that this is yet another stupid WordPress scan for maybe the plugin vulnerability of the day. "twentytwentyone" points to a popular WordPress theme that apparently can be, HOLD YOUR BREATH, be used for version disclosure. In short, this is the normal stupid stuff that I usually do not waste time on. Running WordPress with random themes and plugins? Good luck. I hope you at least add a "!" at the end of your password (which must be "password") to make it so much more secure. The scan itself looked broken. The <see full ISC Diary entry> pattern looked like it was supposed to be replaced with something. So stupid hackers scanning stupid WordPress installs. I ignored it. Leave it up to Xavier to educate me that this isn't stupid but artificially intelligent! Read the full entry: https://isc.sans.edu/diary/OpenAI+Scans+for+Honeypots+Artificially+Malicious+Action+Abuse/31196/
Vega-Lite with Kibana to Parse and Display IP Activity over Time (2024.08.27) https://isc.sans.edu/diary/VegaLite+with+Kibana+to+Parse+and+Display+IP+Activity+over+Time/31210/ Why Is Python so Popular to Infect Windows Hosts? (2024.08.27) https://isc.sans.edu/diary/Why+Is+Python+so+Popular+to+Infect+Windows+Hosts/31208/ Pandas Errors: What encoding are my logs in? (2024.08.23) https://isc.sans.edu/diary/Pandas+Errors+What+encoding+are+my+logs+in/31200/
The list is assembled by pulling recent vulnerabilities from NIST NVD, Microsoft, Twitter mentions of vulnerabilities, ISC Diaries and Podcast, and the CISA list of known exploited vulnerabilities. There are also some unscored, but significant, vulnerabilities at the end. This includes vulnerabilities that have not been added to the NVD yet.
Product: Demozx Gf CMSCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8005NVD References: - https://github.com/demozx/gf_cms/commit/be702ada7cb6fdabc02689d90b38139c827458a5- https://github.com/demozx/gf_cms/commit/de51cc57a96ccca905c837ef925c2cc3a5241383- https://github.com/demozx/gf_cms/issues/5- https://github.com/demozx/gf_cms/issues/5#issuecomment-2296590417- https://vuldb.com/?ctiid.275199- https://vuldb.com/?id.275199- https://vuldb.com/?submit.393981CVE-2024-30949 - Newlib v.4.3.0 allows an attacker to execute arbitrary code through a vulnerability in the _gettimeofday function.Product: Newlib Project CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-30949NVD References: - https://gist.github.com/visitorckw/6b26e599241ea80210ea136b28441661- https://inbox.sourceware.org/newlib/20231129035714.469943-1-visitorckw%40gmail.com/- https://sourceware.org/git/?p=newlib-cygwin.git%3Ba=commit%3Bh=5f15d7c5817b07a6b18cbab17342c95cb7b42be4CVE-2024-35540 - Typecho v1.3.0 is vulnerable to stored cross-site scripting attacks, enabling malicious actors to run unauthorized web scripts or HTML by manipulating input data.Product: Typecho CVSS Score: 9.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-35540NVD References: https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/CVE-2024-43404 - MEGABOT prior to version 1.5.0 has a remote code execution vulnerability through the `/math` command in Discord.Product: Megacord MegabotCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-43404NVD References: https://github.com/NicPWNs/MEGABOT/security/advisories/GHSA-vhxp-4hwq-w3p2CVE-2024-27185 - The pagination class includes arbitrary parameters in links, leading to cache poisoning attack vectors.Product: Joomla! CMS versions 3.0.0-3.10.16-elts, 4.0.0-4.4.6, 5.0.0-5.1.2 CVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-27185NVD References: https://developer.joomla.org/security-centre/942-20240802-core-cache-poisoning-in-pagination.htmlCVE-2024-38175 - Azure Managed Instance for Apache Cassandra has an improper access control vulnerability allowing an authenticated attacker to elevate privileges over a network.Product: Microsoft Azure Managed Instance for Apache CassandraCVSS Score: 9.6NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-38175NVD References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38175CVE-2024-7854 - The Woo Inquiry plugin for WordPress is vulnerable to SQL Injection due to insufficient escaping on the 'dbid' parameter, allowing unauthenticated attackers to extract sensitive information from the database.Product: WordPress Woo Inquiry pluginActive Installations: unknown. This plugin has been closed as of August 19, 2024 and is not available for download. This closure is temporary, pending a full review.CVSS Score: 10.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-7854NVD References: - https://plugins.trac.wordpress.org/browser/woo-inquiry/trunk/includes/functions.php?rev=2088873#L307- https://www.wordfence.com/threat-intel/vulnerabilities/id/312a6601-c914-4661-82ff-6f8bac849442?source=cveCVE-2024-5335 - The Ultimate Store Kit Elementor Addons is vulnerable to PHP Object Injection via deserialization of untrusted input.Product: Brainstorm Force The Ultimate Store Kit Elementor AddonsActive Installations: 1,000+CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-5335NVD References: - https://plugins.trac.wordpress.org/browser/ultimate-store-kit/trunk/includes/helper.php#L1103- https://plugins.trac.wordpress.org/changeset/3135472/ultimate-store-kit/trunk/includes/helper.php- https://www.wordfence.com/threat-intel/vulnerabilities/id/2ae44bcb-6149-4661-8890-23c867e9a918?source=cveCVE-2024-28000 - LiteSpeed Technologies LiteSpeed Cache litespeed-cache version 1.9 through 6.3.0.1 allows Privilege Escalation via Incorrect Privilege Assignment vulnerability.Product: LiteSpeed Technologies LiteSpeed CacheActive Installations: 5,000,000+CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-28000NVD References: - https://patchstack.com/articles/critical-privilege-escalation-in-litespeed-cache-plugin-affecting-5-million-sites?_s_id=cve- https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-6-3-0-1-unauthenticated-privilege-escalation-vulnerability?_s_id=cveCVE-2024-40453 - squirrellyjs squirrelly v9.0.0 and fixed in v.9.0.1 was discovered to contain a code injection vulnerability via the component options.varName.Product: Squirrelly CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-40453NVD References: - https://github.com/squirrellyjs/squirrelly- https://github.com/squirrellyjs/squirrelly/pull/262- https://samuzora.com/posts/cve-2024-40453CVE-2024-42777 - Kashipara Music Management System v1.0 is vulnerable to an Unrestricted file upload vulnerability in "/music/ajax.php?action=signup", enabling attackers to execute arbitrary code by uploading a crafted PHP file.Product: Lopalopa Mu…
Product: ArrowHitech ArrowCMSCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-42914NVD References: - https://github.com/soursec/CVEs/tree/main/CVE-2024-42914- https://github.com/trquoccuong/ArrowCMS/CVE-2024-7568 - The Favicon Generator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to 1.5, allowing unauthenticated attackers to delete arbitrary files on the server by tricking a site administrator into clicking on a forged link.Product: WordPress Favicon Generator pluginActive Installations: 300+CVSS Score: 9.6NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-7568NVD References: - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3139340%40favicon-generator&new=3139340%40favicon-generator&sfp_email=&sfph_mail=- https://www.wordfence.com/threat-intel/vulnerabilities/id/6eb3ad80-3510-4018-91af-b733ef62e28f?source=cveCVE-2024-8127 through CVE-2024-8134 - Multiple D-Link models are vulnerable to remote command injectionProduct: Multiple D-Link modelsCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8127NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8128NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8129NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8130NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8131NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8132NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8133NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8134NVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_unzip.mdNVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_add_zip.mdNVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_s3_modify.mdNVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_s3.mdNVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_module_enable_disable.mdNVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_webdav_mgr.mdNVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R5_SpareDsk_DiskMGR.mdNVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R5_1st_DiskMGR.mdNVD References: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383NVD References: https://www.dlink.com/CVE-2024-8135 - Go-Tribe has a critical vulnerability in the Sign function in pkg/token/token.go, allowing manipulation of config.key to expose hard-coded credentials.Product: Go-TribeCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8135NVD References: - https://github.com/Go-Tribe/gotribe/commit/4fb9b9e80a2beedd09d9fde4b9cf5bd510baf18f- https://github.com/Go-Tribe/gotribe/issues/1- https://github.com/Go-Tribe/gotribe/issues/1#issuecomment-2307205980- https://vuldb.com/?ctiid.275706- https://vuldb.com/?id.275706- https://vuldb.com/?submit.396310CVE-2024-45237 - Fort before 1.6.3 is vulnerable to a buffer overflow when reading a resource certificate with a Key Usage extension containing more than two bytes of data from a malicious RPKI repository.Product: Nicmx Fort-ValidatorCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-45237NVD References: https://nicmx.github.io/FORT-validator/CVE.htmlCVE-2024-8138 - Pharmacy Management System 1.0 is vulnerable to a critical sql injection in the editManager function of the Parameter Handler component, allowing remote attackers to launch attacks with no available updates due to continuous delivery with rolling releases.Product: Pharmacy Management System Project CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8138NVD References: - https://code-projects.org/- https://github.com/SYQGITHUB/cve/blob/main/sql1.md- https://vuldb.com/?ctiid.275718- https://vuldb.com/?id.275718- https://vuldb.com/?submit.396817CVE-2024-45258 - The req package for Go before 3.43.4 may unintentionally send a request with a malformed URL due to a "garbage in, garbage out" design flaw in cleanHost.Product: Go req packageCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-45258NVD References: - https://github.com/imroc/req/commit/04e3ece5b380ecad9da3551c449f1b8a9aa76d3d- https://github.com/imroc/req/compare/v3.43.3...v3.43.4CVE-2024-8073 - Hillstone Networks Web Application Firewall on 5.5R6 is susceptible to Command Injection due to improper input validation, impacting versions 5.5R6-2.6.7 through 5.5R6-2.8.13.Product: Hillstone Networks Web Application FirewallCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8073NVD References: https://www.hillstonenet.com.cn/security-notification/2024/08/21/mlzrld-2/CVE-2024-8161 - ATISolutions CIGES before version 2.15.5 is vulnerable to SQL injection, allowing an attacker to access database information through /modules/ajaxServiciosCentro.php.Product: ATISolutions CIGESCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8161NVD References: https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injec…
Free Virtual Event: SANS 2024 AI Survey: AI and Its Growing Role in Cybersecurity: Lessons Learned and Path Forward | September 11, 10:30 AM ET | Join Matt Edmondson as and other experts as they explore the intersection of AI and cybersecurity and provide actionable insights for practitioners, decision-makers, and enthusiasts eager to navigate the future of digital defense.
Free Virtual Event: SANS 2024 AI Survey: AI and Its Growing Role in Cybersecurity: Lessons Learned and Path Forward | September 11, 10:30 AM ET | Join Matt Edmondson as and other experts as they explore the intersection of AI and cybersecurity and provide actionable insights for practitioners, decision-makers, and enthusiasts eager to navigate the future of digital defense.
Free Virtual Event: SANS 2024 AI Survey: AI and Its Growing Role in Cybersecurity: Lessons Learned and Path Forward | September 11, 10:30 AM ET | Join Matt Edmondson as and other experts as they explore the intersection of AI and cybersecurity and provide actionable insights for practitioners, decision-makers, and enthusiasts eager to navigate the future of digital defense.
Free Virtual Event: SANS 2024 AI Survey: AI and Its Growing Role in Cybersecurity: Lessons Learned and Path Forward | September 11, 10:30 AM ET | Join Matt Edmondson as and other experts as they explore the intersection of AI and cybersecurity and provide actionable insights for practitioners, decision-makers, and enthusiasts eager to navigate the future of digital defense.