Atlassian Confluence RCE Flaw Abused in A number of Cyberattack Campaigns


Opportunistic risk actors have been discovered actively exploiting a not too long ago disclosed vital safety flaw in Atlassian Confluence deployments throughout Home windows and Linux to deploy net shells that end result within the execution of crypto miners on compromised techniques.

Tracked as CVE-2021-26084 (CVSS rating: 9.8), the vulnerability issues an OGNL (Object-Graph Navigation Language) injection flaw that might be exploited to attain arbitrary code execution on a Confluence Server or Information Middle occasion.

“A distant attacker can exploit this vulnerability by sending a crafted HTTP request containing a malicious parameter to a susceptible server,” researchers from Pattern Micro famous in a technical write-up detailing the weak spot. “Profitable exploitation can lead to arbitrary code execution within the safety context of the affected server.”

Automatic GitHub Backups

The vulnerability, which resides within the Webwork module of Atlassian Confluence Server and Information Middle, stems from an inadequate validation of user-supplied enter, inflicting the parser to judge rogue instructions injected inside the OGNL expressions.

The in-the-wild assaults come after the U.S. Cyber Command warned of mass exploitation makes an attempt following the vulnerability’s public disclosure in late August this yr.

Atlassian Confluence

In one such assault noticed by Pattern Micro, z0Miner, a trojan and cryptojacker, was discovered up to date to leverage the distant code execution (RCE) flaw to distribute next-stage payloads that act as a channel to keep up persistence and deploy cryptocurrency mining software program on the machines. Imperva, in an impartial evaluation, corroborated the findings, uncovering comparable intrusion makes an attempt that have been geared toward operating the XMRig cryptocurrency miner and different post-exploitation scripts.

Prevent Ransomware Attacks

Additionally detected by Imperva, Juniper, and Lacework is exploitation exercise carried out by Muhstik, a China-linked botnet identified for its wormlike self-propagating functionality to contaminate Linux servers and IoT gadgets since at the least 2018.

Atlassian Confluence

Moreover, Palo Alto Networks’ Unit 42 risk intelligence group mentioned it recognized and prevented assaults that have been orchestrated to add its clients’ password recordsdata in addition to obtain malware-laced scripts that dropped a miner and even open an interactive reverse shell on the machine.

“As is usually the case with RCE vulnerabilities, attackers will rush and exploit affected techniques for their very own achieve,” Imperva researchers mentioned. “RCE vulnerabilities can simply permit risk actors to use affected techniques for simple financial achieve by putting in cryptocurrency miners and masking their exercise, thus abusing the processing assets of the goal.”



Leave A Reply

Your email address will not be published.