This Month in Cybersecurity: August 2022

Major News Stories

Double Check that Github URL

BleepingComputer reports that some 35,000 Github repositories were forked and their clones modified to include malware. No actual compromises took place; rather, “The thousands of backdoored projects are copies (forks or clones) of legitimate projects purportedly made by threat actors to push malware.” This is a clever attack and a good reminder to always make sure you’re using the repo that you think you’re using!

Atlassian Confluence aka. The Sitting Duck

The venerable Confluence web-based wiki turns 18 this year. Even thought that makes it a legal adult in the U.S., apparently it’s not quite ready for life without significant adult supervision as attackers have discovered a devastating vulnerability in all Confluence wikis that either currently have or at one point in the past installed the “Questions For Confluence” (QFC) app.

The issue stems from the fact that, once installed, the QFC app creates a user with a hard-coded password, one that allows access to all nonrestricted pages in the wiki. Atlassian, the maker of Confluence, notes that uninstalling the QFC app doesn’t remediate the issue, most likely since the user and its hard-coded password remain in the database. Atlassian has patched the actively-exploited bug and urges admins to update their Confluence instances quickly.

Vulnerabilities Found in the Emergency Broadcast Messaging System

“We recently became aware of certain vulnerabilities in EAS encoder/decoder devices that, if not updated to most recent software versions, could allow an actor to issue EAS alerts over the host infrastructure (TV, radio, cable network).” (Source)

Slack Patches Vulnerability that Leaked Hashed Passwords for a Small Subset of Users

“On 4 August 2022, we notified approximately 0.5% of Slack users that we had reset their passwords in response to a bug that occurred when users created or revoked a shared invitation link for their workspace. When a user performed either of these actions, Slack transmitted a hashed version of their password to other workspace members. This hashed password was not visible to any Slack clients; discovering it required actively monitoring encrypted network traffic coming from Slack’s servers.” (Source)

Zoom as a MacOS Attack Vector

A serious flaw in Zoom for MacOS was presented at Defcon 2022. Sector 7 has a great write-up on how the vulnerability works, but in short researchers used it to bypass multiple levels of protection to gain root access on MacOS. Zoom attempted to patch the flaw in version 5.11.5; however, that fix was insufficient and was bypassed several days after release, causing Zoom to issue version 5.11.6.

Welcoming the “Open Cybersecurity Schema Framework”

A number of heavy-hitters in the tech space, including AWS, Cloudflare, and IBM Security, have come together to create The Open Cybersecurity Schema Framework (OCSF): https://github.com/ocsf/. The goal of the framework is to provide a standard set of categories and names around various cybersecurity-related topics, events, etc. The ultimate end goal is that organization A and organization B can reference for example a “Network Activity Event” and both be referring to the same concept as outlined in the OCSF.

Other Software with Critical Patches Available

Deep Dives

A few interesting deep-dive reads from the month:

Learning – CVE-2007-5379

First recorded on October 11, 2007 and earning itself a CVE score of 5.0 out of 10, the description for CVE-2007-5379 reads, “Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.”

Pidgin is an open-source IM client, formerly known as “Gaim.” [1] Apparently, it stored/stores passwords in a .purple/accounts.xml file. It appears that researchers read from this file as a sort of proof-of-concept for this exploit since it allowed for the reading of arbitrary XML files.

The commit that fixed this vulnerability is available here with the fun comment, “Same as xml_in but doesn’t try to smartly shoot itself in the foot” over a new xml_in_string method.

[1] https://en.wikipedia.org/wiki/Pidgin_(software)

Sources & Resources

In addition to inline citations, the following were used or referenced when preparing this debrief.


Thanks for reading, stay safe out there, and have a great weekend! 👩🏾‍💻 🌐 👨‍💻

Written on August 26, 2022 by Alex Smith

At Maxwell, we live our values (ROCKS) everyday. Come tackle worthwhile challenges and make impactful change with us.