phpBB Heb

Main Menu

  • Home
  • Internet Forum
  • PHP Scripting Language
  • Open Source Software
  • Online Communities
  • Commerce

phpBB Heb

Header Banner

phpBB Heb

  • Home
  • Internet Forum
  • PHP Scripting Language
  • Open Source Software
  • Online Communities
  • Commerce
Open Source Software
Home›Open Source Software›Trend Micro: Recent Cyberattacks Target Open Source Web Servers

Trend Micro: Recent Cyberattacks Target Open Source Web Servers

By George T. Sprague
February 22, 2022
0
0

Source: Apache HTTP Server Project

Militarized vulnerabilities lead to great risks

Not only has the total number of Apache HTTP Server vulnerabilities increased, but the number of weaponized vulnerabilities has also increased.

Trend Micro has detected that at least 15 of the 57 vulnerabilities discovered over the past five years were weaponized and used in malicious activity. The most common types of attacks include denial of service (DoS), path traversal, server-side request forgery (SSRF), and remote code execution (RCE). There is evidence that several vulnerabilities discovered in 2021 have been actively exploited.

Table 1: The 15 vulnerabilities weaponized since 2017

CVE-ID note cvss3 The description

CVE-2021-42013

9.8

Path traversal and remote code execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete patch CVE-2021-41773)

CVE-2021-41773

7.5

Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49

CVE-2021-40438

9

SSRF mod_proxy

CVE-2020-11984

9.8

mod_proxy_uwsgi buffer overflow

CVE-2019-10098

6.1

mod_rewrite potential open redirect

CVE-2019-10097

7.2

CVE-2019-10097 mod_remoteip Stack buffer overflow and NULL pointer dereference

CVE-2019-0190

7.5

mod_ssl 2.4.37 Remote DoS when used with OpenSSL 1.1.1

CVE-2018-8011

7.5

mod_md, DoS via Coredumps on specially crafted requests

CVE-2018-1303

7.5

Possible out-of-bounds read in mod_cache_socache

CVE-2018-11763

5.9

DoS for HTTP/2 connections by continuous PARAMETERS

CVE-2017-9798

7.5

Use-after-free when using with unrecognized method in .htaccess (“OptionsBleed”)

CVE-2017-9788

9.1

Memory reflection not initialized in mod_auth_digest

CVE-2017-7668

9.8

ap_find_token() Buffer Overread

CVE-2017-7659

7.5

mod_http2 Null pointer dereference

CVE-2017-15715

8.1

bypass with trailing newline in filename

Source: Apache HTTP Server Project, Trend Micro Inc., NVD

CVE-2021-41773 and CVE-2021-42013both critical vulnerabilities, are prime examples of how attackers exploit Apache HTTP Server vulnerabilities.

As Trend Micro reported, both of these vulnerabilities are path traversal vulnerabilities that allow attackers to map URLs to files/directories outside of the web root. In some configurations where Common Gateway Interface (CGI) scripts are enabled for these paths, attackers can reach RCE on the vulnerable server.

Both discovered at the beginning of October 2021, CVE-2021-41773 and CVE-2021-42013 were detected with over four million exploits by the end of 2021.

Another Apache HTTP Server vulnerability, CVE-2021-40438shows how big the impact can be when the vulnerability is exploited.

CVE-2021-40438 is a vulnerability existing in the mod_proxy module and subject to SSRF. This flaw allows an unauthenticated remote attacker to forward requests to the httpd server to an arbitrary server. The attacker could obtain, modify, or delete resources on other services that might be behind a firewall and otherwise inaccessible. The impact of this flaw varies depending on the services and resources available on the httpd network.

CVE-2021-40438 has a huge impact on products from Cisco, IBM QRadar SIEM, Debian Linux, F5 Os, Red Hat and more. On December 1, 2021, CISA added CVE-2021-40438 to its list of known exploited vulnerabilities.

The schemes behind the attacks

Attacks that target open source web servers could lead to huge threats. Once a web server vulnerability is exploited and hacked, the victim server can be taken over and used for malicious activity.

Common activities include using victim servers to send spam or launching attacks against other servers at the expense of the victim server’s memory and bandwidth. Attackers can also install a phishing website on the victim server to gain access to all data passing through it.

However, the most popular utility of attacks in recent years is cryptojacking: hackers exploit the vulnerability and covertly use the computing power of the victim server to mine popular cryptocurrencies. Trend Micro revealed how cyber actors used vulnerabilities and abuses in GitHub and Netlify repositories to exploit Monero.

For cybercriminals, Apache HTTP Server is always a favorite target: it serves 24.63% of the millions of most visited websites according to Netcraft statistics. Major web service providers such as Slack, Linkedin, The New York Times, GrubHub and many more rely on Apache HTTP Server. For IT professionals, it’s hard to fix such a vital service and not hurt user satisfaction.

Additionally, the complexity of the software supply chain exacerbates the abuse of open source software vulnerabilities today. Cyber ​​attackers could compromise software components from third-party vendors by stealthily inserting malicious code. Compared to the traditional supply chain, the software supply chain requires more levels of verification to ensure its security.

Protect your web server from potential damage

To mitigate the potential risk of open source software attacks, software composition analysis (SCA) has become an effective approach. SCA identifies and lists all parts and versions present in the code. It also checks each specific service and looks for outdated or vulnerable libraries that may pose security risks to the application. These tools can also check for legal issues related to using open source software with different license terms and conditions. Trend Micro released a white paper on how to prevent supply chain attacks in the age of cloud computing in October 2020.

Developing a risk-based approach to patch management can help organizations identify and prioritize the vulnerabilities they need to address now. This approach consists of:

  1. Continuously conduct exposure assessments to determine which VECs – pass and present – are in your environment at all times.

  2. Assess the criticality of those systems that contain those CVEs.

  3. Conduct a continuous but simple survey risk assessment:

    1. Assess the likelihood that these identified CVEs are or will be exploited in the wild versus the impact of these CVEs being used in an attack.
      I. Is a POC available
      ii. Is it in the wild

If you are having difficulty with patch management, you can turn to virtual patches or IPS technology to help, as they can be deployed to detect/block exploits of a vulnerability and give you time to patch properly the vulnerability with the vendor’s patch. Trend Micro’s Bug Bounty Initiative Zero Day program and our vulnerability research teams help us identify new vulnerabilities and develop virtual fixes for our Cloud One, TippingPoint, Apex One, and Worry Free Services customers. In some cases, we have virtual patches months before the vendor patch.

Malicious actors will continue to exploit vulnerable apps, operating systems, and devices in their efforts to attack organizations. Improving your understanding of key applications like Apache can help you better understand where you can minimize your risk of attack.

Related posts:

  1. Best programming languages ​​that will be in demand in 2021
  2. Data Center Automation: 10 Vendors You Should Know
  3. TrustRadius Announces Top Rated Software in Human Resources, Business, Security and Development | state
  4. Why should you learn Linux on Windows Subsystem for Linux
Tagsoperating systemsserver side

Recent Posts

  • A high country paradise for sockeye salmon | Alaska Science Forum
  • How to Choose the Best Tech Stack for Your Startup in 2022
  • Open Source to commercial software, the process from project to product
  • 5G services expected to be rolled out within a month, says MoS Telecom
  • 3 ways every business can get started with an open source software strategy

Archives

  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020

Categories

  • Commerce
  • Internet Forum
  • Online Communities
  • Open Source Software
  • PHP Scripting Language
  • Terms and Conditions
  • Privacy Policy