pwshub.com

Attackers exploit critical vulnerability recently patched in Zimbra servers

Attackers are actively exploiting a critical vulnerability in mail servers sold by Zimbra in an attempt to remotely execute malicious commands that install a backdoor, researchers warn.

The vulnerability, tracked as CVE-2024-45519, resides in the Zimbra email and collaboration server used by medium and large organizations. When an admin manually changes default settings to enable the postjournal service, attackers can execute commands by sending maliciously formed emails to an address hosted on the server. Zimbra recently patched the vulnerability. All Zimbra users should install it or, at a minimum, ensure that postjournal is disabled.

Easy, yes, but reliable?

On Tuesday, Security researcher Ivan Kwiatkowski first reported the in-the-wild attacks, which he described as “mass exploitation.” He said the malicious emails were sent by the IP address 79.124.49[.]86 and, when successful, attempted to run a file hosted there using the tool known as curl. Researchers from security firm Proofpoint took to social media later that day to confirm the report.

On Wednesday, security researchers provided additional details that suggested the damage from ongoing exploitation was likely to be contained. As already noted, they said, a default setting must be changed, likely lowering the number of servers that are vulnerable.

Security researcher Ron Bowes went on to report that the “payload doesn’t actually do anything—it downloads a file (to stdout) but doesn’t do anything with it.” He said that in the span of about an hour earlier Wednesday a honey pot server he operated to observe ongoing threats received roughly 500 requests. He also reported that the payload isn’t delivered through emails directly, but rather through a direct connection to the malicious server through SMTP, short for the Simple Mail Transfer Protocol.

“That's all we've seen (so far), it doesn't really seem like a serious attack,” Bowes wrote. “I'll keep an eye on it, and see if they try anything else!”

In an email sent Wednesday afternoon, Proofpoint researcher Greg Lesnewich seemed to largely concur that the attacks weren’t likely to lead to mass infections that could install ransomware or espionage malware. The researcher provided the following details:

  • While the exploitation attempts we have observed were indiscriminate in targeting, we haven’t seen a large volume of exploitation attempts
  • Based on what we have researched and observed, exploitation of this vulnerability is very easy, but we do not have any information about how reliable the exploitation is
  • Exploitation has remained about the same since we first spotted it on Sept. 28th
  • There is a PoC available, and the exploit attempts appear opportunistic
  • Exploitation is geographically diverse and appears indiscriminate
  • The fact that the attacker is using the same server to send the exploit emails and host second-stage payloads indicates the actor does not have a distributed set of infrastructure to send exploit emails and handle infections after successful exploitation. We would expect the email server and payload servers to be different entities in a more mature operation.
  • Defenders protecting  Zimbra appliances should look out for odd CC or To addresses that look malformed or contain suspicious strings, as well as logs from the Zimbra server indicating outbound connections to remote IP addresses.

Proofpoint has explained that some of the malicious emails used multiple email addresses that, when pasted into the CC field, attempted to install a webshell-based backdoor on vulnerable Zimbra servers. The full cc list was wrapped as a single string and encoded using the base64 algorithm. When combined and converted back into plaintext, they created a webshell at the path: /jetty/webapps/zimbraAdmin/public/jsp/zimbraConfig.jsp.

Source: arstechnica.com

Related stories
1 month ago - FudModule rootkit burrows deep into Windows, where it can bypass key security defenses.
1 month ago - A significant vulnerability in Microsoft Windows security tools was unveiled at the Black Hat security conference. Alon Leviev, a researcher from SafeBreach, showcased a method to exploit the Windows update process, enabling attackers to...
1 month ago - In light of the recently disclosed Sinkclose vulnerability, AMD is releasing updates to address the issue across several processor families. These updates include all generations of EPYC processors, as well as the latest Threadripper and...
1 month ago - Findings undercut pledges of NSO Group and Intgellexa their wares won't be abused.
1 month ago - If you haven't deployed August's patches, get busy before others do Windows users who haven't yet installed the latest fixes to their operating systems will need to get a move on, as code now exists to exploit a critical Microsoft...
Other stories
31 minutes ago - The sun kicked out a major flare, which means the aurora borealis could shine bright from Oct. 3 to Oct. 5. Here's where and how to catch the spectacle.
31 minutes ago - There are countless PopSockets on the market. We've reviewed some of the bestsellers to help you pick one.
40 minutes ago - Trademark royalties is one way to force support of open source, we guess WordPress developer Automattic on Wednesday published details of its efforts to pressure rival WP Engine to sign a trademark license agreement costing millions of...
1 hour ago - Subscribers to Prime Video's ad tier will start seeing more commercials next year, further testing how much advertising streamers will...
1 hour ago - Those cut off from internet and regular cellphone services may be able to get online with help from Spectrum.