While investigating a malicious crypto-mining case, I discovered that attackers implanted the payload exploiting a recently patched RCE vulnerability (CVE-2022-29464) affecting multiple WSO2 products, including API Manager. The vulnerability was discovered by Orange Tsai and responsibly disclosed to WSO2. According to the WSO2 security advisory, “due to improper validation of user input, a malicious actor could upload an arbitrary file to a user-controlled location of the server. By leveraging the arbitrary file upload vulnerability, it is further possible to gain remote code execution on the server” – and this was exactly what happened. After implanting a webshell, attackers executed a shell script (snippet below) to download and run xmrig. A snippet of the XMRig crypto-mining implant script The vulnerability was first published on April 1st 2022 and a proof-of-concept exploit was published 6 days ago on Git-Hub. Affected products: WSO2 API Manager 2.2.0 and above If you have vulnerable versions exposed to the internet, I recommend that in addition to protecting against CVE-2022-29464 vulnerability through patches or mitigations recommended by WSO2, check to see if your environment may have already been compromised. IOCs http://162[.]144.53.108:8080/ldra.sh -- |
Renato 82 Posts ISC Handler Apr 26th 2022 |
Reply Subscribe |
Apr 26th 2022 4 weeks ago |
Sign Up for Free or Log In to start participating in the conversation!