TippingPoint Threat Intelligence and Zero-Day Coverage – Week of September 4, 2017

2017-09-08T14:23:58
ID TRENDMICROBLOG:2E02CB122DC8C3DB57EF3830829E9913
Type trendmicroblog
Reporter Elisa Lippincott (TippingPoint Global Product Marketing)
Modified 2017-09-08T14:23:58

Description

Earlier this week, a ‘severe’ vulnerability was discovered in Apache Struts, an open source framework for developing applications in Java. The vulnerability, CVE-2017-9805, affects all versions of Struts since 2008 and all applications using the framework’s REST plugin are vulnerable. Trend Micro has released DVToolkit CSW file CVE-2017-9805.csw for the Apache Struts 2 Vulnerability to customers using TippingPoint solutions. The CSW file includes the following filters:

Filter C000001: HTTP: Apache Struts 2 XStreamHandler Command Injection Vulnerability

This filter detects an attempt to exploit a command injection vulnerability in Apache Struts 2. The specific flaw exists due to a failure to properly validate requests sent to the REST plugin with the XStream handler. An attacker can leverage this vulnerability to execute code under the context of the application. Note: This filter will be obsoleted by MainlineDV filter 29580.

Filter C000002: HTTP: Apache Struts 2 XStreamHandler Suspicious XML Command Usage

This filter detects usage of suspicious XML objects. Apache Struts 2 is known to be vulnerable to command injection flaws when the REST plugin is used with the XStream handler. While not inherently malicious the serialized data can be used for command injection. Note: This filter will be obsoleted by MainlineDV filter 29572.

References:

|

  • Common Vulnerabilities and Exposures: <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9805>
  • SecurityFocus BugTraq ID: <http://www.securityfocus.com/bid/100609>
  • Vendor Advisory: <http://struts.apache.org/docs/s2-052.html>
    ---|---
    |

Customers who need the latest DVToolkit filters can visit the Threat Management Center (TMC) website at https://tmc.tippingpoint.com and navigate to Releases → CSW Files. For questions or technical assistance on any Trend Micro TippingPoint product, customers can contact the Trend Micro TippingPoint Technical Assistance Center (TAC).

Micro Focus Protect 2017

Trend Micro is a Gold Sponsor at the upcoming Micro Focus Protect 2017 conference in Washington, D.C. starting Monday, September 11 through Wednesday, September 13. In addition to live product demos, yours truly will also be speaking on Tuesday, September 12 at 1:30pm EDT featuring the topic “Prioritize and Remediate the Threats that Matter the Most.” Satinder Khasriya will also be speaking in the Expo Hall featuring the topic “Achieve Groundbreaking Performance and Security Accuracy with Trend Micro TippingPoint.” For more information on the event, click here.

Zero-Day Filters

There are seven new zero-day filters covering three vendors in this week’s Digital Vaccine (DV) package. A number of existing filters in this week’s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative website.

Advantech (3)

|

  • 29540: ZDI-CAN-4994: Zero Day Initiative Vulnerability (Advantech WebAccess)
  • 29542: ZDI-CAN-4995: Zero Day Initiative Vulnerability (Advantech WebAccess)
  • 29543: ZDI-CAN-4996: Zero Day Initiative Vulnerability (Advantech WebAccess)
    ---|---
    |

Foxit (3)

|

  • 29523: ZDI-CAN-4979: Zero Day Initiative Vulnerability (Foxit Reader)
  • 29524: ZDI-CAN-4980: Zero Day Initiative Vulnerability (Foxit Reader)
  • 29531: ZDI-CAN-4981: Zero Day Initiative Vulnerability (Foxit Reader)
    ---|---
    |

Hewlett Packard Enterprise (1)

|

  • 29513: HTTP: HPE Intelligent Management Center ictExpertDownload Code Execution Vulnerability (ZDI-17-663)
    ---|---
    |

Missed Last Week’s News?

Catch up on last week’s news in my weekly recap.