Anonymous ID: a43eeb May 12, 2022, 5:33 a.m. No.16260106   🗄️.is 🔗kun   >>0110 >>0114 >>0119 >>0342 >>0438 >>0496

https://arstechnica.com/information-technology/2022/05/hackers-are-actively-exploiting-big-ip-vulnerability-with-a-9-8-severity-rating/

 

==Hackers are actively exploiting BIG-IP vulnerability with a 9.8 severity rating

Flaw in widely used gear from F5 executes root commands, no password necessary.==

DAN GOODIN - 5/9/2022, 3:46 PM

 

Researchers are marveling at the scope and magnitude of a vulnerability that hackers are actively exploiting to take full control of network devices that run on some of the world's biggest and most sensitive networks.

 

The vulnerability, which carries a 9.8 severity rating out of a possible 10, affects F5’s BIG-IP, a line of appliances that organizations use as load balancers, firewalls, and for inspection and encryption of data passing into and out of networks. There are more than 16,000 instances of the gear discoverable online, and F5 says it’s used by 48 of the Fortune 50. Given BIG-IP's proximity to network edges and their functions as devices that manage traffic for web servers, they often are in a position to see decrypted contents of HTTPS-protected traffic.

 

Last week, F5 disclosed and patched a BIG-IP vulnerability that hackers can exploit to execute commands that run with root system privileges. The threat stems from a faulty authentication implementation of the iControl REST, a set of web-based programming interfaces for configuring and managing BIG-IP devices.

 

“This issue allows attackers with access to the management interface to basically pretend to be an administrator due to a flaw in how the authentication is implemented,” Aaron Portnoy, the director of research and development at security firm Randori, said in a direct message. “Once you are an Administrator, you can interact with all the endpoints the application provides, including one that directly executes commands.”

 

Images floating around Twitter in the past 24 hours show how hackers can use the exploit to access an F5 application endpoint named bash. Its function is to provide an interface for running user-supplied input as a bash command with root privileges.

 

Let's drop CVE-2022-1388 PoC pic.twitter.com/MmyvQGL6eO

 

— 416e6e61 (@AnnaViolet20) May 9, 2022

While many images show exploit code supplying a password to make commands run, exploits also work when no password is supplied. The image quickly drew the attention of researchers who marveled at the power of an exploit that allows the execution of root commands without a password. Only half-joking, some asked how functionality this powerful could have been so poorly locked down.

 

To summarize:

  • The /mgmt/tm/util/bash endpoint is a feature that was decided was necessary

  • No authentication is required for this endpoint

  • The web server runs as root

 

And all of this passed the sanity checks at F5 and the product was shipped for $$$$

Am I missing anything? pic.twitter.com/W55w0vMTAi

 

— Will Dormann (@wdormann) May 9, 2022

I'm not entirely unconvinced that this code wasn't planted by a developer performing corporate espionage for an incident response firm as some sort of revenue guarantee scheme.

 

If so, brilliant. If not, WTAF… https://t.co/4F237teFa2

 

— Jake Williams (@MalwareJake) May 9, 2022

Elsewhere on Twitter, researchers shared exploit code and reported seeing in-the-wild exploits that dropped backdoor webshells that threat actors could use to maintain control over hacked BIG-IP devices even after they’re patched. One such attack showed threat actors from the addresses 216.162.206.213 and 209.127.252.207 dropping a payload to the file path /tmp/f5.sh to install PHP-based webshell in /usr/local/www/xui/common/css/. From then on, the device is backdoored.

 

🚨 Estoy viendo la explotación masiva de F5 BIG-IP CVE-2022-1388 (RCE), instalando #Webshell en /usr/local/www/xui/common/css/ como backdoor para mantener el acceso.

 

Ataques desde:

216.162.206.213

209.127.252.207

 

Payload escribe en /tmp/f5.sh, ejecuta y elimina. pic.twitter.com/W9BlpYTUEU

 

— Germán Fernández (@1ZRR4H) May 9, 2022

The severity of CVE-2022-1388 was rated at 9.8 last week before many details were available. Now that the ease, power, and wide availability of exploits are better understood, the risks take on increased urgency. Organizations that use BIG-IP gear should prioritize the investigation of this vulnerability and the patching or mitigating of any risk that arises. Randori provided a detailed analysis of the vulnerability and a one-line bash script here that BIG-IP users can use to check exploitability. F5 has additional advice and guidance here.

Anonymous ID: a43eeb May 12, 2022, 5:35 a.m. No.16260114   🗄️.is 🔗kun   >>0119

>>16260106

>>16260110

https://twitter.com/scienceherald/status/1523974177291706368

 

The Science Herald

@scienceherald

Hackers are actively exploiting BIG-IP vulnerability with a 9.8 severity rating⁣ #vulnerability #hackers #exploiting #severity #bigip https://ayr.app/l/L6mY

Anonymous ID: a43eeb May 12, 2022, 5:39 a.m. No.16260132   🗄️.is 🔗kun   >>0144

Jered Ede (Project Veritas Chief Legal Officer)

@Jtaylorede

BREAKING:

@FBI

Whistleblower LEAKS Docs Showing Bureau Targeting “News Media” Under "Sensitive Investigative Matter"

 

Alleges “Political Undertakings” & Reveals “Vast Majority” of FBI Agents ‘Troubled’ by Direction Agency is Going

 

#FBIwhistleblower

Anonymous ID: a43eeb May 12, 2022, 6:06 a.m. No.16260229   🗄️.is 🔗kun   >>0273

>>16260216

>2 or more

like at a movie or a concert, or a sporting event, or a religious ritual, or a most watched tv program, or a best seller? totally not a staged sorcery to affect your perception to a specific outcome. it is called media and its purpose is to bind your mind. spellbound.

Anonymous ID: a43eeb May 12, 2022, 6:38 a.m. No.16260387   🗄️.is 🔗kun

>>16260354

re: stay inside meme

 

"I guarantee when they finally go into some of these apartments where people have been locked up for three or four weeks, they're going to find dead bodies of people who've starved to death, people who have died of strokes and heart attacks."

 

From OVER A MONTH AGO, and they are STILL locked down (allegedly)

 

China expert warns death toll from Shanghai's lockdown will be 'far greater' than lives saved

https://www.foxnews.com/media/china-shanghai-lockdown-covid-author-mosher