{"id":82813,"date":"2016-05-04T11:40:55","date_gmt":"2016-05-04T06:10:55","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=82813"},"modified":"2016-05-04T11:40:55","modified_gmt":"2016-05-04T06:10:55","slug":"joomla-exploit-cve-2015-8562-still-at-large","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/joomla-exploit-cve-2015-8562-still-at-large\/","title":{"rendered":"Joomla exploit \u2018CVE-2015-8562\u2019 still at large"},"content":{"rendered":"<p>Back in December 2015<strong>, <\/strong>Joomla, the well-known content management system (CMS) was hit with a serious zero day vulnerability called <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8562\">CVE-2015-8562<\/a>. Joomla versions 1.5.x, 2.x, and 3.x before 3.4.6 were affected by it. Many public exploits were seen in the wild which were exploiting this vulnerability before the CVE was assigned to it. Interestingly, even after 4 months of the security patch being released for this vulnerability, we are seeing active exploitation of this vulnerability in the wild. In this blog post, we will discuss what this vulnerability was and the recent threat actors who were seen to be exploiting this vulnerability in the wild.<\/p>\n<p><strong>The CVE-2015-8562 Vulnerability<br \/>\n<\/strong>The affected versions of Joomla were vulnerable because of improper input validation on the values of \u2018<strong>X-Forwarded-For\u2019 <\/strong>and<strong> \u2018User-Agent\u2019<\/strong> HTTP headers. The attacker was able to inject malicious code into these headers resulting into remote code execution. The root cause of the vulnerability lies in handling of the browser session values where browser information was not validated properly while saving session values into the database.<\/p>\n<p>Let\u2019s take a look at the vulnerable Joomla code which is available in github. The below code snippets highlight the vulnerable code of handling the \u2018<strong>X-Forwarded-For\u2019 <\/strong>and<strong> \u2018User-Agent\u2019<\/strong> HTTP header values.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Figure-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82814 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Figure-1.png\" alt=\"Figure 1\" width=\"1148\" height=\"202\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-1.png 1148w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-1-300x53.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-1-1024x180.png 1024w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-1-789x139.png 789w\" sizes=\"(max-width: 1148px) 100vw, 1148px\" \/><\/a>Figure 1<\/p>\n<p>As shown in figure 1, the value of \u2018<strong>X-Forwarded-For\u2019 <\/strong>header is set to a session parameter \u2018<em>session.client.forwarded<\/em>\u2019 which is not sanitized properly.<\/p>\n<p>The same applies to the \u2018<strong>User-Agent\u2019 <\/strong>header.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Figure-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82815 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Figure-2.png\" alt=\"Figure 2\" width=\"982\" height=\"294\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-2.png 982w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-2-300x90.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-2-789x236.png 789w\" sizes=\"(max-width: 982px) 100vw, 982px\" \/><\/a>Figure 2<\/p>\n<p>As shown in figure 2, the value of \u2018<strong>User-Agent\u2019 <\/strong>header is set to a session parameter \u2018<em>session.client.browser<\/em>\u2019 which is again, not sanitized properly.<\/p>\n<p>Due to the absence of input sanitization on both of these HTTP headers, the attacker sends a crafted request to Joomla servers with a malicious payload to carry out remote code execution.<\/p>\n<p>Malicious crafted request for \u2018<strong>X-Forwarded-For\u2019<\/strong> header<strong>:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Figure-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82816 \" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Figure-3.png\" alt=\"Figure 3\" width=\"788\" height=\"147\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-3.png 1552w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-3-300x56.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-3-1024x191.png 1024w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-3-789x147.png 789w\" sizes=\"(max-width: 788px) 100vw, 788px\" \/><\/a>Figure 3<\/p>\n<p>Malicious crafted request for \u2018<strong>User-Agent\u2019 <\/strong>header<strong>:<\/strong><\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Figure-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-82817 \" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Figure-4.png\" alt=\"Figure 4\" width=\"890\" height=\"146\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-4.png 1550w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-4-300x49.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-4-1024x168.png 1024w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-4-789x130.png 789w\" sizes=\"(max-width: 890px) 100vw, 890px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Figure 4<\/p>\n<p>Many exploits are available in the wild for this vulnerability.<\/p>\n<p><strong>Recent Threat Actors<br \/>\n<\/strong>We have recently observed the following IPs to be exploiting the CVE-2015-8562 vulnerability in the wild. The observed IPs have been reported to be carrying out malicious activities on various online malicious IP scanners such as www.abuseipdb.com.<\/p>\n<table style=\"height: 215px;\" width=\"811\">\n<tbody>\n<tr>\n<td width=\"296\">IP<\/td>\n<td width=\"296\">abuseipdb Report<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">77.243.183.89<\/td>\n<td width=\"296\"><a href=\"https:\/\/www.abuseipdb.com\/report-history\/77.243.183.89\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"296\">79.141.160.51<\/td>\n<td width=\"296\"><a href=\"https:\/\/www.abuseipdb.com\/report-history\/79.141.160.51\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"296\">79.141.161.12<\/td>\n<td width=\"296\"><a href=\"https:\/\/www.abuseipdb.com\/report-history\/79.141.161.12\">Link<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"296\">192.187.114.11<\/td>\n<td width=\"296\"><a href=\"https:\/\/www.abuseipdb.com\/report-history\/192.187.114.11\">Link<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Below is the \u2018whois\u2019 information for a couple of IPs:<br \/>\nwhois information for 79.141.160.51:<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Figure-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82818 size-full aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Figure-5.png\" alt=\"Figure 5\" width=\"347\" height=\"217\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-5.png 347w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-5-300x188.png 300w\" sizes=\"(max-width: 347px) 100vw, 347px\" \/><\/a>Figure 5<\/p>\n<p>whois information for 77.243.183.89:<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Figure-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82819 size-full aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/Figure-6.png\" alt=\"Figure 6\" width=\"459\" height=\"208\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-6.png 459w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/Figure-6-300x136.png 300w\" sizes=\"(max-width: 459px) 100vw, 459px\" \/><\/a>Figure 6<\/p>\n<p><strong>Quick Heal Detection<\/strong><\/p>\n<p>Quick Heal has released below the IPS detection for the CVE-2015-8562 vulnerability.<\/p>\n<ul>\n<li>VID-00514 : Remote Command Execution Vulnerability in Joomla<\/li>\n<li>VID-00515 : Remote Command Execution Vulnerability in Joomla<\/li>\n<\/ul>\n<p><strong>Conclusion<br \/>\n<\/strong>Although the high profile zero-day vulnerability was patched by Joomla four months back, attackers are still targeting the unpatched Joomla. We\u2019d strongly recommend users to patch up their Joomla servers and also apply the latest security updates by Quick Heal.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>ACKNOWLEDGEMENT<br \/>\nSubject Matter Expert:<\/strong><\/p>\n<ul>\n<li>Bikash Dash (Threat Research &amp; Response Team, Quick Heal)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Back in December 2015, Joomla, the well-known content management system (CMS) was hit with a serious zero day vulnerability called CVE-2015-8562. Joomla versions 1.5.x, 2.x, and 3.x before 3.4.6 were affected by it. Many public exploits were seen in the wild which were exploiting this vulnerability before the CVE was assigned to it. Interestingly, even [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":82821,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-82813","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82813"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=82813"}],"version-history":[{"count":2,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82813\/revisions"}],"predecessor-version":[{"id":82822,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82813\/revisions\/82822"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/82821"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=82813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=82813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=82813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}