Breaking
April 13, 2025

This Week in Security: AI Spam, SAP, and Ivanti Jonathan Bennett | usagoldmines.com

AI continues to be used in new and exciting ways… like generating spam messages. Yes, it was inevitable, but we now have spammers using LLM to generate unique messages that don’t register as spam. AkiraBot is a Python-powered tool, designed to evade CAPTCHAs, and post sketchy SEO advertisements to web forms and chat boxes around the Internet.

AkiraBot uses a bunch of techniques to look like a legitimate browser, trying to avoid triggering CAPTCHAs. It also runs traffic through a SmartProxy service to spread the apparent source IP around. Some captured logs indicate that of over 400,000 attempted victim sites, 80,000 have successfully been spammed.

SSRF Attacking AWS

March brought a spike in instances of an interesting EC2 attack. F5 labs has the details, and it’s really pretty simple. Someone is sending requests ending in /?url=hxxp://169.254.169.254/latest/meta-data/iam/security-credentials/, with the hope that the site is vulnerable to a Server Side Request Forgery (SSRF).

That IP address is an interesting one. It’s the location where Amazon EC2 makes the Instance Metadata Service available (IMDSv1). Version 1 of this service completely lacks authentication, so a successful SSRF can expose whatever information that service makes available. And that can include AWS credentials and other important information. The easiest fix is to upgrade the instance to IMDSv2, which does have all the authentication features you’d expect.

SAP and setuid

Up next is this Anvil Secure report from [Tao Sauvage], about finding vulnerable setuid binaries in the SAP Linux images.

Setuid is a slightly outdated way to allow a less-privileged user to run a binary with elevated privileges. The simplest example is ping, which needs raw socket access to send special ICMP packets. The binary is launched by the user, escalates its privileges to send the packet, and then terminates without actually breaking the security barrier. At least that’s what is supposed to happen. In reality, setuid binaries are a consistent source of privilege escalation problems on Linux. So much so, that it’s now preferred to use the capabilities functionality to achieve this. But that’s fairly new, and many distros just give binaries like ping the setuid bit.

This brings us to SAP’s Linux images, like SAP HANA Express. These images include a small collection of custom setuid binaries, with icmbnd and hostexecstart catching our researcher’s eyes. icmbnd notably has the -f flag to specify the output file for a debug trace. That’s a typical setuid problem, in that a user can specify an oddball location, and the binary will change the system’s state in unexpected ways. It’s an easy denial of service attack, but is there a way to actually get root? It turns out the the Linux /etc/passwd file is particularly resilient. Lines that don’t make any sense as password entries are just ignored. Inject a pair of newlines and a single valid passwd entry into the passwd file, and you too can be root on an SAP system.

The hostexecstart vulnerability is a bit more involved. That binary starts and stops the SAP Host Agent on the system. That would be a dead end, except it can also take a SAR archive and upgrade the system agent. [Tao] chased a couple of dead ends regarding library injection and SAR archive signing, before finally using another standard setuid technique, the symbolic link. In this case, link the /etc/passwd file to the local sapcar_output location, and include a malicious passwd line inside a cooked SAR archive. hostexecstart tries to unpack the archive, and outputs the log right into the local sapcar_output file. But that file is really a symbolic link, and it once again clobbers passwd.

Google’s Take on End-to-end-encryption

We’re fans of end-to-end encryption around here. If Alice had a message that’s only intended for Bob to see, then it seems only right that Bob is really the only one that can read the message. The reality of modern cryptography is that this is 100% possible via RSA encryption, and the entire variety of asymmetric encryption schemes that followed. The problem with actually using such encryption is that it’s a pain. Between managing keys, getting an email client set up properly, and then actually using the system in practice, end-to-end asymmetric encryption is usually just not worth the hassle for everyday people.

Google feels that pain, and is bringing easy end-to-end encryption to business Gmail accounts. Except, it’s not actually asymmetric encryption. This works using the key access control list (KACL). Here Alice writes a message, and asks the KACL server for a key to use to send it to Bob. The server provides a symmetric key, and Alice encrypts the message. Then when Bob receives the message, he asks the same server for the same key, and the server provides it, allowing him to decrypt the message.

So is this actually end-to-end encryption? Yes, but also no. While this solution does mean that Google never has the key needed to decrypt the message, it also means that whoever is running the KACL server does have that key. But it is better than the alternative. And the technique in use here could be adapted to make true symmetric encryption far easier for end users.

Ivanti Connect Active Exploit

Google’s Mandiant has announced that Ivanti Connect Secure boxes are under active exploitation via an n-day exploit. This is a buffer overflow that Ivanti discovered internally, and patched in February of this year. The overflow was considered to be strictly limited to denial of service, as the characters written to memory could only be digits and the dot symbol. If that sounds like an IP address, just hang on, and we’ll get there.

It’s apparent that malware actors around the world are actively checking for potential vulnerabilities in Ivanti firmware updates, as the group Mandiant calls UNC5221 has apparently worked out a way to achieve Remote Code Execution with this vulnerability, and is using it to deploy malware on these systems. This is thought to be the same Chinese group that Microsoft appropriately calls Silk Typhoon.

Our friends at watchTowr have dug a bit more into this issue, and found the exact vulnerable code. It’s in HTTP header handling code, where a specific header is first limited to numerals and the period, and then copied into a fixed size buffer. Remember that observation that this sounds like an IP address? The header is X-Forwarded-For, and setting that to a long string of numbers on a vulnerable Ivanti box will indeed trigger a crash in the web binary. There’s no word yet on how exactly that was used to achieve RCE, but we’re very much hoping the rest of the story comes to light, because it’s an impressive feat.

Bits and Bytes

About 100,000 WordPress sites have a real problem. The Ottokit plugin has an authentication bypass issue, where a blank API key can be matched by setting an empty st_authorization header in an incoming request. The flaw was reported privately on April 3rd, and a fixed version was released the same day. But within hours exploitation attempts were seen in the wild.

Legacy Gigacenter devices expose a TR-069 service on port 6998. That service can be accessed with a simple telnet connection, and the commands entered here are not properly sanitized before being evaluated. Anything inside a $() substitution string is executed locally: $(ping -c5 your.ip.address) This makes for an exceedingly trivial remote code execution attack on these devices.

And finally, the Langflow AI workflow tool has a simple remote exploit vulnerability fixed in version 1.3.0. This vulnerability notably allows bypassing authentication through an API endpoint. While Langflow has Python execution by design, doing it while bypassing authentication is a definite problem. You should update to 1.3.0, and don’t expose Langflow to the Internet at all if you can help it.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

Software Project Pieces Broken Bits Back Together Donald Papp | usagoldmines.com

Learning Linux Kernel Modules Using COM Binary Support Maya Posch | usagoldmines.com

A 17th Century Music Computer Al Williams | usagoldmines.com

The Incomplete JSON Pretty Printer (Brought To You By Vibes) Donald Papp | usagoldmines.com

Hacking a Cheap Rechargeable Lamp With Non-Standard USB-C Connector Maya Posch | usagoldmines.com

Vibe Check: False Packages a New LLM Security Risk? Tyler August | usagoldmines.com

JPMorgan Chase Refuses To Reimburse $440,000 After Customer’s Account Hammered With Illicit Withdraw...

DIY Soldering Tweezers, Extra Thrifty Donald Papp | usagoldmines.com

Biting Off More Than I Can Chew Elliot Williams | usagoldmines.com

Bank of America Discloses Data Breach After Customers’ Documents Disappear, Says Names, Addresses, A...

Tiny Pogo Robot Gets Wings, Does Flips Donald Papp | usagoldmines.com

Repairing Classic Sound Cards Jenny List | usagoldmines.com

Tracing the #!: How the Linux Kernel Handles the Shebang Maya Posch | usagoldmines.com

Creating a Somatosensory Pathway From Human Stem Cells Maya Posch | usagoldmines.com

Bank of America Handing $2,850,000 To Customers in Settlement Over Alleged Illegal Fees and Account ...

Gemini 2.0 + Robotics = Slam Dunk? John Elliot V | usagoldmines.com

A Mouse, No Hands! Jenny List | usagoldmines.com

Hackaday Podcast Episode 316: Soft Robots, Linux the Hard Way, Cellphones into SBCs, and the Circuit...

GPS Broken? Try TV! Al Williams | usagoldmines.com

Audio Effects Applied to Text Al Williams | usagoldmines.com

The Jupiter Ace Remembered Al Williams | usagoldmines.com

Brush Up on Your Trade Craft With This Tiny FM Bug Dan Maloney | usagoldmines.com

Farewell Economy 7, a Casualty of the Long Wave Switch-Off Jenny List | usagoldmines.com

Using Integer Addition to Approximate Float Multiplication Maya Posch | usagoldmines.com

Windows on ARM on Arm Bryan Cockfield | usagoldmines.com

A New Mechanical Keyboard for an Old Computer Bryan Cockfield | usagoldmines.com

Improving Magnetoplasmadynamic Ion Thrusters With Superconductors Maya Posch | usagoldmines.com

Ask Hackaday: What’s a Sun-Like Star? Al Williams | usagoldmines.com

Clever Engineering Leaves Appliance Useless Tom Nardi | usagoldmines.com

Everyone’s Talking GPMI, Should you? Jenny List | usagoldmines.com

Making Liquid Oxygen: Far From Easy but Worth the Effort Dan Maloney | usagoldmines.com

Ask Hackaday: Vibe Coding Jenny List | usagoldmines.com

Ask Hackaday: Vibe Coding Jenny List | usagoldmines.com

Going to the Top with a Raspberry Pi Elevator Al Williams | usagoldmines.com

FLOSS Weekly Episode 828: Incus Inception Jonathan Bennett | usagoldmines.com

Self-Hosting a Cluster on Old Phones Bryan Cockfield | usagoldmines.com

You Shouldn’t Build an X-Ray Machine, But You Could Al Williams | usagoldmines.com

In 2025, The Philly Maker Faire Finds Its Groove Tom Nardi | usagoldmines.com

Forget Propellers, Embrace Tentacle-based Locomotion Donald Papp | usagoldmines.com

Better Bearings Take the Wobble Out of Premium Scroll Wheel Dan Maloney | usagoldmines.com

Salamander Robot is Squishy Al Williams | usagoldmines.com

Dozens of Solenoids Turn Vintage Typewriter into a Printer Dan Maloney | usagoldmines.com

ASCII to Mainframe Al Williams | usagoldmines.com

Designing A Tone Control Properly Jenny List | usagoldmines.com

The Computers of EPCOT Al Williams | usagoldmines.com

FreeDOS 1.4 Released Maya Posch | usagoldmines.com

Turning Old Cellphones into SBCs Elliot Williams | usagoldmines.com

LayerLapse Simplifies 3D Printer Time-lapse Shots Tom Nardi | usagoldmines.com

Printed Robotic Arm Pumps Up With Brushless Motors Tom Nardi | usagoldmines.com

The 1980s Computer, French Style Jenny List | usagoldmines.com

Simple Antenna Makes for Better ESP32-C3 WiFi Dan Maloney | usagoldmines.com

Atomic Clock Trades Receiver for an ESP8266 Tom Nardi | usagoldmines.com

Buyer Beware: Cheap Power Strips Hold Hidden Horrors Dan Maloney | usagoldmines.com

A Tiny Tape Synth Jenny List | usagoldmines.com

London Police Team Up With International Law Firm After Elderly Victim Defrauded for $2,580,000 Rhod...

Keebin’ with Kristina: the One Where We Embrace the Jank Kristina Panos | usagoldmines.com

Fiber Laser Gives DIY PCBs a Professional Finish Tom Nardi | usagoldmines.com

Why USB-C Splitters Can Cause Magic Smoke Release Maya Posch | usagoldmines.com

Which Browser Should I Use In 2025? Jenny List | usagoldmines.com

Tracking the ISS Made Easy Elliot Williams | usagoldmines.com

A Tale Of Nuclear Shenanigans From Down Under Jenny List | usagoldmines.com

Pluto’s Not a Planet, But It Is a Spectrum Analyzer Al Williams | usagoldmines.com

Command and Conquer Ported to the Pi Pico 2 Tom Nardi | usagoldmines.com

Hackers Hammer Android and iPhone Users As Bank Account Attacks Surge 258% in One Year: Kaspersky Ma...

Reverse Engineering the IBM PC110, One PCB at a Time Tom Nardi | usagoldmines.com

An Amstrad PCW Receives A Bit Of Love Jenny List | usagoldmines.com

Emulating iPhone on QEMU Al Williams | usagoldmines.com

Celebrating 30 Years of Windows 95 at VCF Adam Fabio | usagoldmines.com

A Low F Number Lens, From Scratch Jenny List | usagoldmines.com

Ben Eater vs. Microsoft BASIC Elliot Williams | usagoldmines.com

$4,400 Drained From Bank of America Account After Owner Is Violently Robbed of His Unlocked Phone – ...

Inside an Edison Phonograph Al Williams | usagoldmines.com

How Shrinking Feature Size Made Modern Wireless Work Elliot Williams | usagoldmines.com

How a Tiny Relay Became a USB Swiss Army Knife Heidi Ulrich | usagoldmines.com

Wells Fargo Ordered To Pay $832,000,000 in Damages After Jury Finds Lender Mismanaged and Charged Un...

If You’re 3D Scanning, You’ll Want a Way To Work with Point Clouds Donald Papp | usagoldmines.com

Chase and PayPal Scam Drains $30,000 From Victims’ Bank Accounts: Report Daily Hodl Staff | usagoldm...

A Look Inside MacPaint Al Williams | usagoldmines.com

Disney’s Bipedal, BDX-Series Droid Gets the DIY Treatment Donald Papp | usagoldmines.com

8 Pins For Linux Jenny List | usagoldmines.com

Lockdown Remote Control Project is Free and Open Elliot Williams | usagoldmines.com

The Transputer in your Browser Al Williams | usagoldmines.com

Thousands of Americans’ Personal Information Exposed By Banking Giant Capital One, Alleges New Class...

First PCB with the Smallest MCU? Elliot Williams | usagoldmines.com

Vintage Computer Festival East This Weekend Elliot Williams | usagoldmines.com

Supercon 2024: Quick High-Feature Boards With The Circuit Graver Lewin Day | usagoldmines.com

3D Print (and Play!) The Super Mario Tune as a Fidget Toy Donald Papp | usagoldmines.com

Hackaday Podcast Episode 315: Conductive String Theory, Decloudified Music Players, and Wild Printin...

This Week in Security: Target Coinbase, Leaking Call Records, and Microsoft Hotpatching Jonathan Ben...

Keep Bears at Bay with the Crackle of 280,000 Volts Lewin Day | usagoldmines.com

A Portable Electronics Workstation Al Williams | usagoldmines.com

Playstacean Evolves The PSOne Into The Crab It Was Always Meant to Be Navarre Bartz | usagoldmines.c...

A Proper OS For The Sega Genesis/Megadrive Jenny List | usagoldmines.com

The Weird Way A DEC Alpha Boots Jenny List | usagoldmines.com

Woman Loses $3,000,000 in Crypto Pig Butchering Scam After Fake Platform Showed 80% Profits: Report ...

Teardown of a Scam Ultrasonic Cleaner Maya Posch | usagoldmines.com

Australia’s Silliac Computer Al Williams | usagoldmines.com

FBI Recovers $8,000,000+ of Investor Funds Stolen by CEO of Collapsed Heartland Tri-State Bank in Cr...

Ditto That Kristina Panos | usagoldmines.com

MIT Wants You to Secure Your Hardware Designs Al Williams | usagoldmines.com

Leave a Reply