SharePoint Critical Vulnerability – CVE-2020-16952

CVE-2020-16952

Discovered: Proof-of-Concept released & vulnerability patched by Microsoft on October 13

Impacted Tech:

Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2019

Note that SharePoint Online via Office365 is not affected.

Attacker Location: Authenticated access to SharePoint with page creation permission

Highlights: Public proof of concept is available and is very easy to exploit using breached credentials or chaining it with a phishing attack.

What should I do? Apply the patch from Microsoft as soon as possible.

References:

MSFT Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952
Researcher’s Advisory and PoC: https://srcincite.io/advisories/src-2020-0022/
Metasploit Module: https://github.com/rapid7/metasploit-framework/pull/14265

Zerologon – Netlogon Critical Vulnerability

CVE-2020-1472

Discovered: Patched by Microsoft on August’s Patch Tuesday. Disclosed on September 11. Multiple public exploits available at the time of patching.

Impacted tech: Cryptography of Netlogon protocol

Attacker Location: Compromised internal computer

Highlights: Unbelievably easy to exploit

Leet was recently made aware of a critical vulnerability in Netlogon’s cryptography. The technical details were disclosed by Secura on September 11, but the vulnerability was patched on August 11 (Patch Tuesday).

CVE-2020-1472 (dubbed Zerologon) allows an attacker to elevate to change the computer account password of any domain connected computer from their initial foothold on an internal network, so long as the compromised machine can connect to the target machine. Secura states that “by forging an authentication token for specific Netlogon functionality, [attackers are] able to call a function to set the computer password of the Domain Controller [or any other computer] to a known value. After that, the attacker can use this new password to take control over the domain controller and steal credentials of a domain admin.”

There are multiple publicly available exploits and tools to check if you’re vulnerable.

This repository has a PoC and a restoration script to restore the domain controller password.
https://github.com/dirkjanm/CVE-2020-1472

What should I do?
Deploy the patch from August 11

References:

Secura’s Blog Post & Whitepaper:
https://www.secura.com/blog/zero-logon
https://www.secura.com/pathtoimg.php?id=2055

Microsoft’s Advisory (outdated at the time of this writing, rated as “Exploitation Less Likely” because there were no publicly available exploits when it was written on August 11).
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472

Apache Struts Critical Vulnerability

CVE-2019-0230

Struts allows developers to use “forced double evaluation” for tag attributes. Using this feature with user input allows malicious OGNL (Object-Graph Navigation Language) expressions to be injected by an external attacker. Depending on the injected payload, this can result in remote code execution.

In their recent announcement, Apache said “we continue to urge developers building upon Struts 2 to not use %{…} or ${…} syntax referencing unvalidated user modifiable input in tag attributes, since this is the ultimate fix for this class of vulnerabilities.”

Source: https://www.tenable.com/blog/cve-2019-0230-apache-struts-potential-remote-code-execution-vulnerability

There is public exploit code available for this vulnerability.

This issue was fixed in Apache Struts 2.5.22, which was released in November 2019.