Security

Patches

Atlassian, Microsoft bugs on CISA’s must-patch list after exploitation spree

Some days, security just feels like a total illusion. OK, most days...


A recently disclosed critical vulnerability in Atlassian's Bitbucket is actively being exploited, according to the US government.

The Cybersecurity and Infrastructure Security Agency (CISA) late on Friday placed the flaw – tracked as CVE-2022-36804 – on its catalog of Known Exploited Vulnerabilities (KEV), effectively a must-patch list.

GreyNoise, a company that tracks and analyzes internet traffic, said it found evidence the security hole was being exploited in the wild.

CISA put the vulnerability in Bitbucket Server and Data Center tools on the KEV list on the same day as two high-profile Microsoft Exchange zero-day flaws.

Atlassian disclosed the vulnerability August 24, saying it affected both the Server and Data Center builds of its Git-based source code management tool. Both are code-hosting and collaboration offerings for development teams, but while Server is designed for a single-server deployment, Data Center offers active-active clustering and smart mirroring capabilities.

The flaw, which was discovered via Atlassian's bug bounty program, was introduced in version 7.0.0 of both, impacting all versions released running that version through 8.3.0. It's a command-injection vulnerability in a number of API endpoints that attackers could abuse through specially crafted HTTP requests to execute arbitrary code on vulnerable installations.

In a blog post about the vulnerability in late September, researchers at Rapid7 initially said there had been no public reports of exploits in the wild as of September 20, but changed that three days later as such reports began to emerge.

"There has been strong interest in the vulnerability from researchers and exploit brokers, and there are now multiple public exploits available," they wrote before the reports of exploitation attempts arose, foretelling the future.

"Because the vulnerability is trivially exploitable and the patch is relatively simple to reverse-engineer, it's likely that targeted exploitation has already occurred in the wild. We expect to see larger-scale exploitation of CVE-2022-36804 soon."

In its alert, Atlassian listed seven versions that had been fixed and recommended that organizations upgrade their tools immediately. If that's not possible, they should turn off public repositories.

The flaw was the latest problem for the Aussie software shop, which also disclosed two critical flaws in July that impacted its Bamboo, Bitbucket, Confluence, Fisheye, Crucible, and Jira products that could be exploited by remote and unauthenticated attackers to bypass authentication used by third-party applications. Before that was another critical flaw in Confluence and in the spring a two-week-long cloud outage that affected almost 800 customers.

Exchange users, stop looking so smug

Also added to CISA's list are the two zero-day vulnerabilities in Microsoft Exchange Server. One (CVE-2022-41040) is a server-side request forgery vulnerability and the other (CVE-2022-41082) is a remote code execution bug; both can exploited together to run PowerShell commands on a vulnerable system and hijack it.

Both were reported by Vietnamese cybersecurity firm GTSC late last week and Microsoft's Threat Intelligence Team (MSTIC) said in a blog post October 1 that the holes were being exploited in "limited targeted attacks." We're told a single crew in August was able to exploit the bugs to install a backdoor and exfiltrate data from a victim's network, for instance.

"Microsoft observed these attacks in fewer than 10 organizations globally," the Windows giant wrote. "MSTIC assesses with medium confidence that the single activity group is likely to be a state-sponsored organization."

The vulnerabilities have been dubbed ProxyNotShell because of their similarities with the ProxyShell bug. Travis Smith, vice president of malware threat research at Qualys, told The Register there are still thousands of systems that remain vulnerable to the ProxyShell flaws.

"Organizations who responded to the ProxyShell vulnerability should pay close attention to this one as well," Smith said. "Those responsible for patching Exchange servers need to take their lessons learned on rapid remediation, as this vulnerability is likely to see increased exploitation quickly in the coming days."

The Azure titan has yet to issue a fix for the Exchange bugs. It has published mitigation steps, though some security researchers are questioning whether those efforts will be enough. One infosec bod with the Twitter handle Janggggg wrote that the URL pattern to detect and prevent exploitation can be bypassed, while Will Dormann wrote that the mitigations seem "unnecessarily precise, and therefore insufficient."

Security in Exchange Server has been an ongoing issue for Microsoft, so much so that the mega-corp is vowing to improve its defenses through such methods as adopting zero-trust principles.

Qualys' Smith said Exchange is a "juicy target" for attackers.

"Exchange is an email server, so it must be connected directly to the internet," he said. "And being directly connected to the internet creates an attack surface which is accessible from anywhere in the world, drastically increasing its risk of being attacked."

In addition, Exchange is "a mission-critical function. Organizations can't just unplug or turn off email without severely impacting their business in a negative way," he said. ®

Send us news
7 Comments

A year on, CISA realizes debunked vuln actually a dud and removes it from must-patch list

Apparently no one thought to check if this D-Link router 'issue' was actually exploitable

Google submits complaints about Microsoft licensing to UK competition regulator

Now Microsoft has regulator breathing down its neck in three regions

FTC wants Microsoft's relationship with OpenAI under the microscope

Hey Bing, how can I invest billions in a company but not break antitrust laws?

Microsoft partners with labor unions to shape and regulate AI

Redmond reassures AFL-CIO workers they won't be pushed out by technology

Experienced Copilot help is hard to find, warns Microsoft MVP

Almost nobody has used it, or knows it well, so beware of consultants bearing cred

Two years on, 1 in 4 apps still vulnerable to Log4Shell

Lack of awareness still blamed for patching apathy despite it being among most infamous bugs of all time

Attacks abuse Microsoft DHCP to spoof DNS records and steal secrets

Akamai says it reported the flaws to Microsoft. Redmond shrugged

Microsoft's relationship with OpenAI now in competition regulator's sights

Has recent CEO, board shenanigans given rise to a merger situation? CMA is asking for a friend

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good

Atlassian security advisory reveals four fresh critical flaws – in mail with dead links

Bitbucket, Confluence and Jira all in danger, again. Sigh

Microsoft issues deadline for end of Windows 10 support – it's pay to play for security

Limited options will be available into 2028, for an undisclosed price

Microsoft confirms Smart App issue renaming everyone's printers to HP

Not only turning up uninvited, but telling folks they suddenly have a LaserJet