Podcast Detail

SANS Stormcast Wednesday Mar 26th: XWiki Exploit; File Converter Correction; VMWare Vulnerability; Draytek Router Reboots; MMC Exploit Details;

If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9380.mp3

Podcast Logo
XWiki Exploit; File Converter Correction; VMWare Vulnerability; Draytek Router Reboots; MMC Exploit Details;
00:00

XWiki Search Vulnerablity Exploit Attempts (CVE-2024-3721)
Our honeypot detected an increase in exploit attempts for an XWiki command injection vulnerablity. The vulnerability was patched last April, but appears to be exploited more these last couple days. The vulnerability affects the search feature and allows the attacker to inject Groovy code templates.
https://isc.sans.edu/diary/X-Wiki%20Search%20Vulnerability%20exploit%20attempts%20%28CVE-2024-3721%29/31800

Correction: FBI Image Converter Warning
The FBI's Denver office warned of online file converters, not downloadable conversion tools
https://www.fbi.gov/contact-us/field-offices/denver/news/fbi-denver-warns-of-online-file-converter-scam

VMWare Vulnerability
Broadcom released a fix for a VMWare Tools vulnerability. The vulnerability allows users of a Windows virtual machine to escalate privileges within the machine.
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25518

Draytek Reboots
Over the weekend, users started reporting Draytek routers rebooting and getting stuck in a reboot loop. Draytek now published advise as to how to fix the problem.
https://faq.draytek.com.au/docs/draytek-routers-rebooting-how-to-solve-this-issue/

Microsoft Managemnt Console Exploit CVE-2025-26633
TrendMicro released details showing how the MMC vulnerability Microsoft patched as part of its patch tuesday this month was exploited.
https://www.trendmicro.com/en_us/research/25/c/cve-2025-26633-water-gamayun.html


Podcast Transcript

 Hello and welcome to the Wednesday, March 26, 2025
 edition of the SANS Internet Storm Center's
 Stormcast. My name is Johannes Ullrich and today I am
 recording from Jacksonville, Florida. Well, today in
 Diaries we do have an interesting vulnerability that
 I saw being exploited. It affects XWiki. Wikis, of
 course, are always dangerous. However, the vulnerability
 being exploited is not in a feature that's commonly
 associated with dangers like uploading files or allowing
 users to edit a page. It's in the search feature. And in
 this case, actually, the search feature is open to
 remote code execution. The problem is that this
 particular wiki, and again we're talking about XWiki
 here, is written in Java and it does allow for output
 rendering transformations. The idea behind this is that part
 of the wiki code is essentially these templates
 and then as they're being sent to the user, well, they're
 being parsed. That's where these rendering
 transformations are being applied. But in the search
 feature, the search string also was subject to these
 rendering transformations. So if you searched for a Groovy,
 in this case, code snippet, well, that code was actually
 then parsed as the data was returned to the user. And that
 led to the remote code execution. The vulnerability
 is about a year old. I haven't seen a lot of exploitation
 against it. Just sort of now sort of bubbled to the top.
 Early expectations were like about in June. But only sort
 of, you know, individual hits against our honeypots, which
 sort of didn't make it to our threshold where we sort of
 consider it something new and noteworthy. Definitely update
 xwiki, make sure that it is up to date. But again, there's an
 older vulnerability. So nothing that's just breaking
 new. And then I have a correction to yesterday's
 podcast. Sorry, I don't have the note from the listener who
 actually pointed that out anymore. But the problem was
 the FBI's announcement about image conversion tools that
 actually referred to online tools. So you're not
 downloading the tool here. Instead, you're uploading your
 image or document to a website that then does the conversion
 for you. The threat here is that some of these websites
 will basically take content from the document and
 exfiltrate it. But they also, when they return then the
 converted file, that converted file that you're then
 downloading may contain malware. So that was the
 threat here, which is something different than sort
 of what you usually see. And definitely more makes sense
 that there is this special advisory for this particular
 threat. And in vulnerabilities, we do have
 updates from VMware. This update fixes an authentication
 bypass in VMware tools. The scope is a little bit more
 limited here. An attacker who has normal user access to a
 Windows virtual machine may be able to gain administrative
 access to that Windows virtual machine. So not necessarily
 sort of a jailbreak style vulnerability. Has a CVSS
 score of 7.8. And again, only affects VMware tools and only
 on Windows. And I think it was just last week that I was
 looking at some Draytek vulnerabilities that were
 being exploited against our honeypots. Well, it looks like
 Tratech actually had a bad weekend with many customers
 reporting that their routers were stuck in a reboot loop.
 So Tratech makes these routers, firewall combos, and
 apparently a firmware update issue or something like that.
 It's not really specified. It did cause that reboot loop.
 They do suggest upgrading to the latest firmware. However,
 with the router rebooting, that may not be that easy. It
 apparently is working better if you disconnect the WAN
 interface. And then there's also an option to update via
 TFTP, which in itself can be a little bit tricky to set up.
 But that's sort of your last resort if the update via the
 web application does not work. And Trend Micro released some
 details regarding the Microsoft Management Console
 vulnerability that was patched by Microsoft this month. This
 was one of the vulnerabilities that was already being
 exploited. So Trend Micro is now going over some of the
 exploits that they have seen as part of Ransom Air and how
 the exploit worked. There's a particularly interesting evil
 twin issue here where an attacker could basically give
 you two snap-ins for the Microsoft Management Console
 with the same name, trick you into loading the not evil one,
 and then use that to then later execute code from the
 evil one. More details in the blog. It's a little bit too
 much here for the podcast. Well, and this is it for
 today. If you're living in Jacksonville, today on
 Wednesday, I'll be speaking over lunch at the InfraGuard
 meeting. I'll be going over some of the United Storm
 Center. Please register on their website for more details
 on that. Thanks for listening and talk to you again
 tomorrow. Bye.