Tuesday , May 14 2024
Artica Proxy

Unpatched PHP Deserialization Vulnerability in Artica Proxy

SonicWall Capture Labs found a vulnerability with the Artica Proxy appliance. This vulnerability affects over 100K servers globally. Artica Proxy is a proxy solution that performs tasks like web filtering, SSL inspection, and bandwidth management. SonicWall has developed measures to mitigate the vulnerability.

There is a security vulnerability called CVE-2024-2054 in the administrative web interface. It allows users to execute code without authentication, which can lead to the execution of code under the “www-data” user account. The severity score is 9.8. This affects version 4.50 and earlier versions. Although there are currently no reports of active attacks, there is a publicly available proof of concept provided by the Korelogic research team.

Bangladesh bank published CBS guideline Version 2.0

The banking industry in Bangladesh is the core driver in economic development of the country. The focus on inclusion and...
Read More
Bangladesh bank published CBS guideline Version 2.0

Fortinet report
Attackers exploiting vulnerabilities 50% faster, just 4.76 days

Fortinet reported that in the second half of 2023, the average time form the disclosure of a vulnerability to its...
Read More
Fortinet report  Attackers exploiting vulnerabilities 50% faster, just 4.76 days

TechCrunch report
Indian gov.t sites compromised to plant online betting ads

Indian government websites have been used by scammers to place ads that send visitors to online betting sites. TechCrunch found...
Read More
TechCrunch report  Indian gov.t sites compromised to plant online betting ads

Damage Costs Predicted To Exceed $265 Billion By 2031
Ransomware expected to attack every 2 seconds by 2031

Ransomware damage costs are predicted to exceed $265 billion by 2031, and it is expected to be the fastest growing...
Read More
Damage Costs Predicted To Exceed $265 Billion By 2031  Ransomware expected to attack every 2 seconds by 2031

ALERT CISA WARNS
Black Basta ransomware breached over 500 orgs worldwide

CISA, FBI, HHS, and MS-ISAC released a joint Cybersecurity Advisory called #StopRansomware: Black Basta. It provides tactics, techniques, procedures, and...
Read More
ALERT CISA WARNS  Black Basta ransomware breached over 500 orgs worldwide

Cyber Attack On Data Center Cooling Systems results disruption

According to cybersecurity analysts at Dragos, while cloud adoption offers many benefits for industrial companies , it also poses certain...
Read More
Cyber Attack On Data Center Cooling Systems results disruption

Chrome Zero-Day Alert — Update Your Browser to Patch

Google released an urgent security update for Chrome browser. The update fixes a critical vulnerability that is already being exploited...
Read More
Chrome Zero-Day Alert — Update Your Browser to Patch

Dell Discloses Data Breach: 49 million customers allegedly affected

A security breach has been reported, with a threat actor claiming to be selling a database with 49 million customer...
Read More
Dell Discloses Data Breach: 49 million customers allegedly affected

BIG VULNERABILITIES IN NEXT-GEN BIG-IP

Eclypsium recently found flaws in F5’s BIG-IP Next Central Manager, which could let attackers take control of the network. BIG-IP...
Read More
BIG VULNERABILITIES IN NEXT-GEN BIG-IP

UK confirms Ministry of Defence payroll data exposed in data breach

he UK government confirmed that hackers recently broke into the country's Ministry of Defence and accessed part of the Armed...
Read More
UK confirms Ministry of Defence payroll data exposed in data breach

The vendor has not released a patch yet. Organizations are strongly advised to follow the steps in the mitigation section below. SonicWall customers are already protected with IPS signature 19786, released on March 18th.

Technical Overview:

An unauthenticated user can send an HTTP POST request to the “/wizard/wiz.wizard.progress.php” endpoint with the “build-js” query parameter.

             Figure 1: wiz.wizard.progress.php lines 10-16

During the “build-js” user input processing, it decodes the base64 value and sends it to the “unserialize” PHP function. This is depicted in Figure 2.

          Figure 2: wiz.wizard.progress.php buld.js function

 

This is the root cause of the vulnerability, as an unauthenticated attacker can control the base64 encoded input which is then directly deserialized.

Triggering the Vulnerability:

To exploit this vulnerability, an attacker needs to send an HTTP POST request to the Artica Proxy instance with the manipulated “build-js” parameter set to a base64-encoded payload. The public PoC code demonstrates this using the Linux “curl” command as shown in Figure 3.

                  Figure 3: Triggering the vulnerability using curl

to read the full report click here.

 

Check Also

BIG-IP

BIG VULNERABILITIES IN NEXT-GEN BIG-IP

Eclypsium recently found flaws in F5’s BIG-IP Next Central Manager, which could let attackers take …

Leave a Reply

Your email address will not be published. Required fields are marked *