According to the advisory published by ConnectWise, the vulnerability is an Improper Neutralization of Special Elements in Output Used by a Downstream Component.
An attacker can exploit the vulnerability to execute remote code or directly access confidential data.
The vulnerability impacts ConnectWise Recover v2.9.7 and earlier versions and R1Soft SBM v6.16.3 and earlier versions.
Huntress researchers explained that the authentication bypass and sensitive file leak (CVE-2022-36537) affect the Java framework “ZK” Ajax web application framework used within the ConnectWise R1Soft software Server Backup Manager SE.
The experts published a video PoC that demonstrates the exploitation of the issue to 1) bypass authentication, 2) upload a backdoored JDBC database driver to gain code execution, and 3) use the REST API to trigger commands to registered agents to ultimately push the recently leaked Lockbit 3.0 ransomware to all downstream endpoints.
The good news is that the company is not aware of active exploitation of the vulnerability in the wild.
“It is important to note that the upstream ZK vulnerability not only affects R1Soft, but also any application utilizing an unpatched version of the ZK framework. The access an attacker can gain by using this authentication bypass vulnerability is specific to the application being exploited, however there is serious potential for other applications to be affected in a similar way to R1Soft Server Backup Manager.” concludes the post published by Huntress. “Huntress is working closely with our DIVD partners to continue the larger hunt and help secure other ZK applications that are at risk.”
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, ConnectWise)
[adrotate banner=”5″]
[adrotate banner=”13″]
North Korea-linked actors deploy a new Linux variant of FASTCash malware to target financial systems,…
WordPress Jetpack plugin issued an update to fix a critical flaw allowing logged-in users to…
Pokemon dev Game Freak confirmed that an August cyberattack led to source code leaks and…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet products and Ivanti CSA bugs to…
An alleged nation-state actor exploited three zero-day vulnerabilities in Ivanti Cloud Service Appliance (CSA) in…
Dutch police dismantled Bohemia/Cannabia, two major dark web markets for illegal goods, drugs, and cybercrime…
This website uses cookies.