Chuyển đến nội dung chính

10 Security Vulnerabilities That Broke the World Wide Web in 2016

Information security is a subject in cyber-world which we can’t think away anymore. Data breaches can cost millions when sensitive information is leaked on the Internet. Zero-day exploits pop up for sale every day in deep web forums in return for Bitcoins. However, few exploits are disclosed in public domain once the vulnerability is patched by the vendor. This past year, we had over 6400 common vulnerabilities and exposures which were issued a CVE ID. There were few major bug fixes by the vendors serving backbone of the Internet.
Here is the list of top 10 security vulnerabilities which came to light this year.
1. Dirty Cow (CVE-2016-5195)
Discovered by Phil Oester, Dirty Cow, is a kernel vulnerability that allows any unprivileged existing user to escalate its privilege to root. Root is the highest privilege on any UNIX or LINUX system, which has access to all the files. This vulnerability is known as privilege escalation. COW (Change on Write) is a technique used by Linux to reduce duplication of memory objects. By utilizing Race condition, the under-privileged user can modify read-only objects, which in the ideal case should not happen. If you are a system administrator, you may want to update the kernel of your Linux server. This is by far, the top vulnerability discovered & disclosed in 2016.
2. PHPMailer RCE (CVE-2016-10033, CVE-2016-10045)
PHPMailer, one of the most widely used email sending libraries in PHP was vulnerable to Remote Code Execution. Any attacker can execute shell commands on the web server using this vulnerability. It happens because the E-Mail address header field “From: ” could be set by a user input but there is an absence of “sender” property. So, if a shell command is set by the user in “From: ” header then it will result into RCE. If you are using PHPMailer in your production web servers, then it’s time to upgrade it as soon as possible. This vulnerability was found by Dawid Golunski.
3. ImageTragick (CVE-2016-3714)
Discovered by Nikolay Ermishki, ImageTragick is considered to be one of the most impactive bugs of 2016. Insufficient filtering for filename passed to delegate’s command allows remote code execution during conversion of several file formats. This vulnerability was heavily exploited & many organizations were found vulnerable to ImageTragick vulnerability as shown in Hackerone’s public disclosure.
4. DROWN (CVE-2016-0800)
DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) exploits a flaw in SSLv2 that lets an attacker decrypt communications that use TLS or SSL. It was categorized as a cross-protocol attack. If SSLv2 was enabled on the victim’s server, then it was vulnerable DROWN. 17% of all servers on the Internet were exposed to potential data theft. An advisory was published by OpenSSL.
5. Remote Code Execution in Apple OS X and iOS (CVE-2016-463)
Images, as we all know are harmless. However, have you ever thought that you could get pawned by viewing maliciously crafted images? This was the case with CVE-2016-4631 which was discovered by security researcher Tyler Bohan from Talos Security. This vulnerability poses a significant threat to Apple users. When rendered by applications that use the Image I/O API, a specially crafted TIFF Image can be used to create heap-based buffer overflow which can ultimately result in remote code execution.
6. Persistent code execution on Chrome OS (CVE-2016-5180)
Google released security fixes for Chrome OS in their Version 53.0.2785.143 m update of Google Chrome. Google paid $100,000 to an anonymous security researcher for finding and responsibly disclosing the bug. Google, in its advisory mentions, that “It is a chain of exploits that gains code execution in guest mode across reboots, delivered via a web page. We anticipate landing additional changes and hardening measures for these vulnerabilities in the near future.”
ETHICAL HACKING TRAINING – RESOURCES (INFOSEC)
7. MS16-032
Founded by James Forshaw, this vulnerability could allow elevation of privilege if the Windows Secondary Logon Service fails to manage request handles in memory properly. In simple words, it is a bug that allows anyone to leak a handle opened in a privileged process into a lower privileged process. Windows 7 to Windows 10 as well as Windows Server 2008-2012 were found vulnerable.
8. Firefox SVG Animation Remote Code Execution (CVE-2016-9079)
Firefox published a security bulletin which described the vulnerability “A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows.” That leaked true IP of your machine, even if you use Tor browser. It is believed that intelligence agencies, as well as black hats, may have used this vulnerability to snoop over people.
9. Adobe Flash remote code execution (CVE-2016-7892)
Adobe Flash has a long history of nasty security vulnerabilities. This month, Adobe patched 31 vulnerabilities. The most important one was the patch for an use-after-free vulnerability. It was spotted in the wild that, this exploit were used to target Internet Explorer users. Users were prompt to update any affected versions.
10. Symantec/Norton Antivirus ASPack Remote Heap/Pool Memory Corruption Vulnerability (CVE-2016-2208)
A remote code execution vulnerability in Symantec/ Norton Antivirus was found by Google’s project zero team. With the help of remote code execution, attackers can be able to execute malicious code and could take complete control over the system. This vulnerability could be exploited by sending an email or via a web browser to a user using Symantec AV Engine, resulting in kernel memory corruption. This is as bad as it can get. A patch was released by the vendor within a month.
Apart from these, there are many critical vulnerabilities which were discovered and patched in 2016. It is quite evident that anyone who can exploit using these 10 vulnerabilities can take over the World Wide Web. Security researchers are helping vendors to fix as well as mitigate vulnerabilities by participating in their responsible disclosure programs. Such responsible disclosure programs are known as Bug bounty program in which a white hat researcher reports a flaw to a vendor, and in return, the vendor pays them or acknowledge them as a token of appreciation.
The need of bug bounty program is increasing; Instead of selling exploits in an underground forum for huge stacks of money, hackers are motivated to disclose to the organization responsibly. The more we connect to the Internet, higher the risk of getting hacked. It is important to keep track of latest security vulnerabilities, updating your software and systems.

Bài đăng phổ biến từ blog này

Tổng Hợp Về Tấn công XSS và Bypass

1-        XSS là gì ?        XSS(  Cross-Site Scripting ) là một trong những kỹ thuật hack website phổ biến nhất hiện nay bằng cách chèn vào url, chèn qua các thanh tìm kiếm hoặc chèn ở bất cứ 1 textbox nào những thẻ HTML hoặc những đoạn mã script nguy hiểm, từ đó chiếm quyền điều khiển của victim hoặc thực hiện những mệnh lệnh mà hacker đưa ra. 2-        Nguyên lý hoạt động XSS        Khi website đã bị chèn các thẻ html hay những đoạn mã script nghĩa là đã gửi các request từ máy client đến server  nhằm chèn vào đó các thông tin vượt quá tầm kiểm soát của server. Khi người sử dụng click vào những link đó thì toàn bộ cookies, mật khẩu lưu trên trình duyệt được gửi về cho hacker qua email hoặc 1 file nào đó trên host đã được thiết lập từ trước hoặc bị dẫn tới 1 trang fishing mà hacker đã thiết lập từ trước hay bị cài đặt các chương trình virus, Trojan, backdoor trên máy victim tùy vào mệnh lệnh của hacker 3-        Phân loại XSS XSS Có 2 dạng, đó là:      +       Persistent +      Non-Pe

Hack the Pentester Lab: from SQL injection to Shell II (Blind SQL Injection)

Today we are going to perform penetration testing with part II of previous lab, download it from  here . Now install the iso image in VM ware and start it. In this lab task level is intermediate and challenge is to gain access of administration console and then upload a PHP webshell. Start Kali Linux then open the terminal and  type netdiscover  command for scanning network. Here  192.168.1.102  is my target IP which is shown in the screenshot. Now explore this IP in browser. When you will open target IP in browser you will get a web page having heading My Awesome Photoblog . On the top of left side it contains some tags: home; test; ruxcon; 2010; all pictures; admin. Now  Click  on  test . The given URL : http://192.168.1.102/cat.php?id=1  will run sql query for  ID 1  now let try to find out whether the above URL is vulnerable to sql injection or not by adding( ‘) apostrophe at last of URL: http://192.168.1.102/cat.php?id=1 ’ as it is not vulnerable. I didn’t get any error messa

CEH v9 (CEHVIETNAM.COM) - Hacking Metasploitable Lab

CEH v9 : Hacking Metasploitable VM In this guide, I will demonstrate how to root a Metasploitable 2 virtual machine. Metasploitable is an intentionally vulnerable Ubuntu machine. I’ll explore just a few of the many ways Metasploitable can be attacked, from vulnerabilities in common services to little known exploits and web vulnerabilities. I’ve set up Kali Linux and Metasploitable VMs in VirtualBox on the same network (bridged mode). Kali – 192.168.56.101 Metasploitable – 192.168.56.102 - Hãy thay IP của bạn cho thích hợp Contents   1 Footprinting 1.1 Ping 1.2 Traceroute 2 Scanning 2.1 Port Scanning 2.2 OS Fingerprinting 2.2.1 nmap 2.2.2 xprobe2 3 Enumeration 3.1 FTP (TCP 21) Enumeration 3.2 Telnet (TCP 53) Enumeration 3.3 SMTP (TCP 25) Enumeration 3.4 VNC (TCP 5900) Enumeration 3.5 X11 (TCP 6000) Enumeration 3.6 RLogin (TCP 513) Enumeration 3.7 IRC (TCP 6667) Enumeration 4 Exploitation 4.1 FTP Exploit 4.2 VNC Password Cracking 4.3 IRC Exploit 4.4 Share this: