Breaking
June 7, 2025

This Week in Security: Roundcube, Unified Threat Naming, and AI Chat Logs Jonathan Bennett | usagoldmines.com

Up first, if you’re running a Roundcube install prior to 1.5.10 or 1.6.11, it’s time to update. We have an authenticated Remote Code Execution (RCE) in the Roundcube Webmail client. And while that’s not quite the level of chaos that an unauthenticated RCE would cause, it’s still to be taken seriously. Mainly because for the majority of the 53 million Roundcube installs out there, the users aren’t entirely trusted.

The magic at play in this vulnerability is the Roundcube user session code, and specifically the session deserialization scheme. There’s a weird code snippet in the unserialize function:
if ($str[$p] == '!') {
$p++;
$has_value = false;

The exclamation mark makes the code skip a character, and then assume that what comes next has no value. But if it does actually have a value, well then you’ve got a slightly corrupted deserialization, resulting in a slightly corrupted session. This really comes into force when combined with the file upload function, as the uploaded filename serves as a payload delivery mechanism. Use the errant exclamation mark handling to throw off deserialization, and the filename can contain arbitrary session key/value pairs. A GPG class from the PEAR library allows running an arbitrary command, and this can be hijacked with the session manipulation.

NetMRI Tackled By Rhino

The folks at Rhino security labs took on NetMRI, a network automation suite from Infoblox. The results are entertaining, like https:///webui/application/get_saml_request?saml_id=1%26http://$(whoami) in a browser or via curl being enough to demonstrate unauthorized code execution. It’s not terribly difficult to understand what’s happening there. %26 is the HTTP encoding for the ampersand symbol, &. On a Linux terminal, that runs a command in the background, and most importantly, allows a second command to be run in the same string of text. The SAML request is used to generate a terminal command, and isn’t properly sanitized for special characters like the ampersand.

There are also a couple of hard coded credentials that made appearances in the released image, and a SQL injection attack right inside a URL GET parameter. One more particularly interesting problem was the arbitrary file read by an authenticated user. A Java servlet that is normally used for creating reports can be manipulated to return files. Interestingly, these files are fetched with root permissions, indicating the Java code is probably running as root as well. The vulnerabilities were reported September of last year, and Infoblox responded right away, though the actual fixes took several months to roll out.

Credit Card Terminal Shell

The Worldline Yomani XR credit card terminal is an interesting device. The hardware design has extensive anti-tamper protections, enough that [Stefan Gloor] tripped them when disassembling and reassembling the device. After this, he opted to desolder the flash chip and dump the firmware. The hardware was well built, but the software leaves much to be desired. It’s Linux 3.6 built with a 2010 release of buildroot, but apparently built in 2023. That’s a bit scary, and there are likely plenty of vulnerabilities to choose from due to the firmware age.

But as with essentially all of these embedded Linux devices, there is a serial debug port available. And to log in as root, there is no password required. It’s a good thing the device has all that tamper protection, right? The serial port is accessible via a removable panel, that does not trigger tamper protection. So it’s game over for this device, right? That’s where things get a bit murky. The secure side of the device is not running under the Linux system. It seems like it is working as a bootloader and network co-processor for the secure chip. That’s as far as [Stefan] got with this project, but it’s an interesting look into the security boundaries of this sort of device. [Stefan] is a Siemens employee, which is the parent company of Hackaday.

Midnight Blizzard, or Cozy Bear

CrowdStrike and Microsoft have announced a new cooperative effort, to unify their threat actor naming schemes. You may remember, that Microsoft’s scheme results in some delightful monikers like Cinnamon Tempest. Though on the other hand, CrowdStrike has produced winners like Gothic Panda and Remix Kitten. This new effort isn’t bringing an end to either naming scheme, but indicates that the two companies will cooperate to keep their list of threat actors synced together.

Tnok vs Fwknop

There’s new security tool, Tnok, and hits rather close to home. Tnok is a port knocking solution based on the Time-based One Time Password (TOTP) algorithm, that aims at allowing non-root users to send secure port knocking requests using either UDP or TCP. One of the stated goals is to allow for TCP knocking without requiring the full 3-way TCP handshake. The solution [Sean] discovered was to send a couple characters of that TOTP code as the Max Segment Size of the TCP SYN packet.

I spent a couple years working on the Open Source Fwknop codebase, that also implements a port knocking scheme with real cryptography. While I’m thrilled that more research is being done into modern port knocking, I do worry that this approach will have a Denial of Service issue. Because the token space of TOTP is small, Tnok includes a built-in temporary IP blocking feature. Try to authenticate too many times without a valid TOTP token, and your IP is blocked. Normally it’s essentially impossible to make spoofed TCP connections over the Internet, but eliminating the need for the 3-way handshake may make it all to easy to spoof a victim IP, triggering that IP block.

Court-ordered Privacy Violations

There are times that legal systems are a bit out of sync with the realities of modern technology. The court order that OpenAI must preserve all ChatGPT logs seems to be a great example of this. The background is that news organizations are suing OpenAI for copyright violations, and requested the extra log retention to try to demonstrate that users are using ChatGPT to defeat paywalls.

The real problem here is that refusing to delete user logs upon request is a crime itself under California and European privacy laws. This order puts OpenAI in a very difficult position, and users are understandably concerned. OpenAI is fighting the order through their own legal filings. This one should be interesting to watch.

Bits and Bytes

Google has delisted a pair of certificate authorities in Chrome. Chunghwa and Netlock were both removed as a result of “a pattern of compliance failures, unmet improvement commitments, and the absence of tangible, measurable progress in response to publicly disclosed incident reports.” The offending actions seem to be things like issuing bad certificates and then failing to quickly revocation certificates with problems.

The GitHub Security Blog has the story of DNS Rebind attacks. This style of attack is particularly useful to defeat Same Origin Policy on a service hosted on a machine’s localhost. Manipulate a domain name to point to one IP upon first load, and then a different IP, and those two IPs are unintentionally both accessible from scripts using that DNS name.

The WooCommerce WordPress plugin had an arbitrary file upload issue, where a PHP factory was unintentionally disabling the the upload validation features in WordPress. This problem was announced while there was still silence from WooCommerce, but before the normal 90 day time period had passed. Version 4.1.8 is now available fixing the issue.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

The Bellmac-32 CPU — What? Al Williams | usagoldmines.com

Freeze-drying for improved metal printing Aaron Beckendorf | usagoldmines.com

A Flip Clock Becomes a Flip Timer Navarre Bartz | usagoldmines.com

A Network Status Panel The Way It Should Be Jenny List | usagoldmines.com

Solder Stencil Done Three Ways Matt Varian | usagoldmines.com

Hackaday Podcast Episode 324: Ribbon Microphone From A Gumstick, Texture From a Virtual Log, and a R...

In Film, What’s Old May Still Be New Again Jenny List | usagoldmines.com

Soviet Calculator Teardown Reveals Similarities And Differences Lewin Day | usagoldmines.com

Hackers Hit Android Users’ Bank Accounts As New Malware Becomes ‘Global Threat’: Report Daily Hodl S...

SPACEdeck is Half Cyberdeck, Half Phone Case, All Style Tyler August | usagoldmines.com

A Flashlight of Fire and Ice Al Williams | usagoldmines.com

$41,000 Drained From Woman’s PNC Bank Account – And Her Daughter Is Now a Suspect: Report Rhodilee J...

Building an Analog Echo Plate Lewin Day | usagoldmines.com

Turning the Pluto SDR into a Network Analyzer Aaron Beckendorf | usagoldmines.com

Leakage Control for Coupled Coils Heidi Ulrich | usagoldmines.com

A Steady Vacuum For The Fastest Cassette Tape Drive Ever Jenny List | usagoldmines.com

Supercon 2024: From Consultant to Prototyper On A Shoestring Budget Lewin Day | usagoldmines.com

Screens of Death: From Diagnostic Aids to a Sad Emoji Maya Posch | usagoldmines.com

Piko, Your ESP32 Powered Fitness Buddy John Elliot V | usagoldmines.com

Running FreeDOS and 8086tiny on the Game Boy Advance Because You Can Maya Posch | usagoldmines.com

Passive Saturation Box is a Cheap Way To Distort Your Sound Lewin Day | usagoldmines.com

Slide Rule by Helix Al Williams | usagoldmines.com

24-Year-Old Arrested for Allegedly Masterminding Several High-Profile Crypto Kidnappings in France: ...

Government Imposes Cash Withdrawal Limits on Crypto ATMs in Australia in New Scam Crackdown Attempt ...

Adding Assistive Technology to a Doorbell Bryan Cockfield | usagoldmines.com

Making solder wick less painful Aaron Beckendorf | usagoldmines.com

Customer Who Stole $830,000 From Wells Fargo After Initiating Fraudulent Payments Sentenced to Priso...

FLOSS Weekly Episode 835: Board Member B Jonathan Bennett | usagoldmines.com

The Blackberry Keyboard: How An Open-Source Ecosystem Sprouts Arya Voronova | usagoldmines.com

A Vintage ‘Scope Comes Back To Life Jenny List | usagoldmines.com

High-Stakes Fox Hunting: The FCC’s Radio Intelligence Division in World War II Dan Maloney | usagold...

Tune In to “Higher Lower”, the Minimal Handheld Electronic Game Donald Papp | usagoldmines.com

3D Printing a Modular Guitar Means It Can Look Like Whatever You Want Lewin Day | usagoldmines.com

Making a LEGO Vehicle Which Can Cross Large Gaps John Elliot V | usagoldmines.com

Building An Automatic Wire Stripper And Cutter Lewin Day | usagoldmines.com

Building An Eight Channel Active Mixer Lewin Day | usagoldmines.com

Authorities Warn of Phony Text Messages Phishing for Sensitive Information, Telling Victims Their Ba...

Open Source Watch Movement Really Ticks All the Boxes Tyler August | usagoldmines.com

3D Printed Tank Has a Cannon to Boot Lewin Day | usagoldmines.com

Bankers Warn of ‘Crazy’ Amounts of Fraud Targeting Elderly Amid Push for New Regulations: Report Dai...

Supercon 2024: How To Track Down Radio Transmissions Lewin Day | usagoldmines.com

Simulation and Motion Planning for 6DOF Robotic Arm John Elliot V | usagoldmines.com

My Winter of ’99: The Year of the Linux Desktop is Always Next Year Maya Posch | usagoldmines.com

Add Wood Grain Texture to 3D Prints – With a Model of a Log Donald Papp | usagoldmines.com

Spin-Casting This Telescope Mirror In Resin Didn’t Go To Plan Lewin Day | usagoldmines.com

The Keyboard Sinclair Never Made Heidi Ulrich | usagoldmines.com

The 1972 INTERCAL Compiler Revealed Al Williams | usagoldmines.com

Planetary Poetry with a Tiny Digital Core Heidi Ulrich | usagoldmines.com

3D Printing A Capable RC Car Lewin Day | usagoldmines.com

Ender 3 Pro Gets A Second Job As A Stator Winder Lewin Day | usagoldmines.com

Keebin’ with Kristina: the One with the H.R. Giger Keyboard Kristina Panos | usagoldmines.com

What Use Is An Original Raspberry Pi? Jenny List | usagoldmines.com

The Potential Big Boom In Every Dust Cloud Maya Posch | usagoldmines.com

Depositing Metal On Glass with Fiber Laser Tyler August | usagoldmines.com

This BB Shooter Has a Spring, But Not For What You Think Donald Papp | usagoldmines.com

Testing Brick Layers in OrcaSlicer With Staggered Perimeters Maya Posch | usagoldmines.com

2025 Pet Hacks Contest: Weigh Your Dog The Easy Way Jenny List | usagoldmines.com

Insurance Companies Attempting To Take Advantage of Crypto Investors Who Fear Kidnapping: Report Rho...

Hackaday Links: June 1, 2025 Dan Maloney | usagoldmines.com

It’s MIDI for the TRS-80! Lewin Day | usagoldmines.com

Plenty Of LEDs And Useful Too: The 2025 DORS/CLUC Badge Jenny List | usagoldmines.com

Making The Codec Communicator From Metal Gear Solid Lewin Day | usagoldmines.com

Adaptive Optics Take Clearest Pictures of the Sun Yet Bryan Cockfield | usagoldmines.com

Portal 2 Becomes An Impressively Capable Web Server Lewin Day | usagoldmines.com

Disarming a Nuke… Twice Bryan Cockfield | usagoldmines.com

Can We Replace a Program Counter with a Linear-Feedback Shift Register? Yes We Can! John Elliot V | ...

ESPer-CDP Plays CDs and Streams in Style Tyler August | usagoldmines.com

Hot Rod Backyard Bath on Steel Spring Legs Heidi Ulrich | usagoldmines.com

Wells Fargo Reportedly Rejects Reimbursement After $44,000 Drained From Accounts – Until Questions S...

Building a Wireless Motorized Fader For Lighting Control Lewin Day | usagoldmines.com

$20,000,000 Payout To Data Breach Victims Incoming, With 5,000,000+ People Set To Receive Settlement...

Pulling Back the Veil, Practically Elliot Williams | usagoldmines.com

A CRT Display for Retro Weather Forecasting Aaron Beckendorf | usagoldmines.com

Making a Treadmill Into a 3D Printer Lewin Day | usagoldmines.com

17 Year Old Hellboy II Prop Still Amazes Heidi Ulrich | usagoldmines.com

White LED Turning Purple: Analyzing a Phosphor Failure Maya Posch | usagoldmines.com

184,000,000 Usernames and Passwords Exposed in Extraordinary Data Breach – Apple, Microsoft, Faceboo...

You Wouldn’t Download A Skateboard? Fenix Guthrie | usagoldmines.com

Tidy LED Matrix Displays GIFs On Demand Lewin Day | usagoldmines.com

2025 Pet Hacks Contest: Keep The Prey At Bay With The Cat Valve Jenny List | usagoldmines.com

DIY Solar Generator Inspired By James Webb Telescope Lewin Day | usagoldmines.com

Hackaday Podcast Episode 323: Impossible CRT Surgery, Fuel Cells, Stream Gages, and a Love Letter to...

This Week in Security: CIA Star Wars, Git* Prompt Injection and More Jonathan Bennett | usagoldmines...

Sustainable 3D Prints with Decomposable Filaments Heidi Ulrich | usagoldmines.com

Today in Edinburgh: The Open Source Hardware Summit Elliot Williams | usagoldmines.com

What does Linux Need? A Dial! Jenny List | usagoldmines.com

364,333 Americans At Risk As Data Giant Discovers Breach – Social Security Numbers, Names and Other ...

Another Doom Port To The Atari ST Lewin Day | usagoldmines.com

IcePI Zero: A Pi Zero for FPGA Tyler August | usagoldmines.com

IcePI Zero: A Pi Zero for FPGA Tyler August | usagoldmines.com

Sui Community Launches Vote on Recovering $162,000,000 in Stolen Crypto From Hacker Conor Devitt | u...

A Simple Tip for Gluing Those LED Filaments Donald Papp | usagoldmines.com

You Can Make Your Own Ribbon Mic With A Gum Wrapper Lewin Day | usagoldmines.com

2025 Pet Hacks Challenge : Poopopticon Is All Up In Kitty’s Business Tyler August | usagoldmines.com

Researchers Are Slowly Finding Ways To Stem The Tide Of PFAS Contamination Lewin Day | usagoldmines....

3D Print ABS Without a Screaming Hot Bed Donald Papp | usagoldmines.com

Forced E-Waste PCs and the Case of Windows 11’s Trusted Platform Maya Posch | usagoldmines.com

Bring Back The BIOS! (To UEFI Systems, That Is) Jenny List | usagoldmines.com

The Cost of a Cheap UPS is 10 Hours and a Replacement PCB Maya Posch | usagoldmines.com

Tool Turns SVGs into Multicolor 3D Prints Donald Papp | usagoldmines.com