This Week in Cybersecurity: May 08-14, 2022
Major News Stories
- This week, F5’s BIG-IP network appliances (software and/or hardware devices used for proxying, load balancing, etc.) gave a good reminder of why it’s always good to ensure that device management interfaces aren’t exposed to the public internet: CVE-2022-1388 allowed an unauthenticated attacker to run code on the devices. Several honeypots reported seeing attempts at running
rm -rf /*
, aka. erase the entire file system! - Also this week, Rubygems.org released a security advisory for CVE-2022-29176: “The advisory was about a bug, which allowed a malicious user to yank certain gems, and to upload different files with the same name, same version number, and different platform.” More information and a nice succinct break down of the issue here.
- A few interesting deep-dive reads from the week:
Other Software with Critical Patches Available
- Microsoft’s May 2022 patch Tuesday was this week. Some pretty important patches landed for actively-exploited 0-days, so patch your Windows systems ASAP.
Learning – CVE-2006-4111
Ruby on Rails first CVE was CVE-2006-4111
, publicly disclosed on Monday, August 14, 2006.
Earning itself a CVSS score of 7.5/10, the vulnerability affected Rails versions < 1.1.5 and allowed, “remote attackers to execute Ruby code with ‘severe’ or ‘serious’ impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable.” [1]
In Ruby, the LOAD_PATH
variable is used to tell Ruby where to look for files: “The [Ruby] require
keyword searches for the dependencies in the array [set by] $LOAD_PATH
and tries to load it for the file that has a dependency on [a] certain library.” [2]
Thus, this CVE allowed attackers to modify the locations Ruby searches for executable scripts via a simple file upload. Bonus points to any attackers who figured out how to get Ruby to execute their uploaded file by adding the file uploads directory to the LOAD_PATH
- yikes!
[1] https://www.cvedetails.com/cve/CVE-2006-4111
[2] https://medium.com/@aayushsharda/why-to-use-load-path-in-ruby-ce971bc1d864
[3] There’s also a fun historical write-up with a code diff here
Sources & Resources
The following were used or referenced when preparing this debrief.
- https://isc.sans.edu/podcast.html
- https://www.bleepingcomputer.com/news/security/critical-f5-big-ip-vulnerability-exploited-to-wipe-devices/
- https://www.appdeliveryworks.com/BIG-IP-Software.asp
- https://isc.sans.edu/forums/diary/F5+BIGIP+Unauthenticated+RCE+Vulnerability+CVE20221388/28624/
- https://github.com/horizon3ai/CVE-2022-1388
- https://greg.molnar.io/blog/rubygems-cve-2022-29176/
- https://isc.sans.edu/forums/diary/Microsoft+May+2022+Patch+Tuesday/28632/
Thanks for reading, stay safe out there, and have a great weekend! 👩🏽💻 🌐 🧑🏽💻