Overview

Recently, NSFOCUS has received a slew of reports from customers in the finance, telecom, and Internet sectors on similar security events. Through analysis, NSFOCUS believes that these events are all associated with the malware-infected WebLogic Server (WLS) host. Specifically, attackers exploit the WLS component vulnerability (CVE-2017-10271) to attack the WLS middleware host via a crafted payload, which will lead to download and execution of a cryptocurrency miner.

Affected Versions

  • WebLogic Server 10.3.6.0.0
  • WebLogic Server 12.1.3.0.0
  • WebLogic Server 12.2.1.1.0
  • WebLogic Server 12.2.1.2.0

The preceding WLS versions are all officially supported by Oracle.

Unaffected Versions

  • WebLogic Server 12.2.1.3

 

Technical Solutions

Self Check

This wave of attacks was aimed to download and execute cryptocurrency miners. Therefore, at the host level, the malware can be detected by monitoring host system resources and analyzing processes; at the network level, the C&C address pool and Bitcoin mining pool can be monitored for corresponding domain names and IP addresses so as to discover other infected hosts.

For a Linux host, first, check the /tmp directory for suspicious files owned by any WebLogic account, such as watch-smartd, Carbon, and default.

Then analyze processes and system resources to check whether there are suspicious processes launched by any WebLogic account.

Finally, use the deployed firewall or intrusion prevention device to monitor the C&C address pool and Bitcoin mining pool for the following domain names and IP addresses:

minergate.com

minexmr.com

78.46.91.134

104.25.208.15

104.25.209.15

136.243.102.167

136.243.102.154

94.130.143.162

88.99.142.163

72.11.140.178

 

Official Fix

Oracle has fixed the WLS component vulnerability (CVE-2017-10271) in its October update. Users are advised to download the update and upgrade the application to the latest as soon as possible.

The update is available in the following link:

http://www.oracle.com/technetwork/middleware/weblogic/downloads/index.html

Workaround

According to the PoC exploit, the vulnerability exists in the CoordinatorPortType interface of the wls-wsat component. If this component is not applied in the WLS cluster, users are advised to make a backup of and delete this component for the time being.

1. Delete the WebLogic wls-wsat component as follows (the actual path may vary):

rm -f /home/WebLogic/Oracle/Middleware/wlserver_10.3/server/lib/wls-wsat.war

 

rm -f /home/WebLogic/Oracle/Middleware/user_projects/domains/base_domain/servers/AdminServer/tmp/.internal/wls-wsat.war

 

rm -rf /home/WebLogic/Oracle/Middleware/user_projects/domains/base_domain/servers/AdminServer/tmp/_WL_internal/wls-wsat

2. Restart the WebLogic domain controller service.

DOMAIN_NAME/bin/stopWeblogic.sh   # Terminates the service.

DOMAIN_NAME/bin/startManagedWebLogic.sh   # Starts the service.

For details about how to restart the WebLogic service, see the following document:

https://docs.oracle.com/cd/E13222_01/wls/docs90/server_start/overview.html

NSFOCUS’s Recommendations

Use NSFOCUS’s detection products or service to detect the vulnerability:

  • For Internet-facing assets, use the emergency vulnerability detection service of NSFOCUS Cloud to check for the vulnerability online. The service is available at the following link:

https://cloud.nsfocus.com/#/krosa/views/initcdr/productandservice?page_id=12

  • For intranet assets, use NSFOCUS RSAS V5/V6 or WVSS to check for the vulnerability:
      • Remote Security Assessment System (RSAS V6):

http://update.nsfocus.com/update/listRsasDetail/v/vulweb

      • Remote Security Assessment System (RSAS V5):

http://update.nsfocus.com/update/listAurora/v/5

      • Web Vulnerability Scanning System (WVSS):

http://update.nsfocus.com/update/listWvssDetail/v/6/t/plg

  • For intranet assets, use NSFOCUS NIDS to check for the vulnerability:

Network Intrusion Detection System (NIDS):

http://update.nsfocus.com/update/listIds

You should upgrade your devices to the latest version by downloading upgrade packages from the preceding links before using them to detect vulnerabilities.

Use NSFOCUS’s protection products (NIPS, NIDS, or NF) to protect against the vulnerability:

  • Network Intrusion Prevention System (NIPS):

http://update.nsfocus.com/update/listIps

  • Next-Generation Firewall (NF):

http://update.nsfocus.com/update/listNf

  • Web Application Firewall (WAF):

http://update.nsfocus.com/update/wafIndex

You should upgrade your devices to the latest version by downloading upgrade packages from the preceding links before using them for protection.

Technical Analysis

The following is a security advisory released by Oracle in April, which provides various patches for its vulnerable products:

http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html

The following is a patch update advisory released in October:

https://www.oracle.com/technetwork/topics/security/cpuoct2017-3236626.html

“A remote user can exploit a flaw in the Oracle WebLogic Server WLS Security component to gain elevated privileges [CVE-2017-10271]”

The preceding is a description of the CVE-2017-10271 vulnerability from https://securitytracker.com/id/1039608.

A PoC test has the following result:

A drill-down analysis finds that this is still a vulnerability in XMLDecoder. The next step is to analyze patch code. Let’s start with the patch for the CVE-2017-3506 vulnerability. In the weblogic/wsee/workarea/WorkContextXmlInputAdapter.java file, a method “validate” is added. Its implementation mechanism is as follows:

Simply put, in the process of parsing XML, if the Element field value is Object, an exception is thrown. Such a fix seems a bit amateur. That is why the CVE-2017-10271 vulnerability occurs. In a previous analysis of the October patch update for Oracle WebLogic, we found that code related to WorkContextXmlInputAdapter addressed only the DoS vulnerability, without imposing any restrictions on the use of “new”, “method”, and “void” like the CVE-2017-10271 patch. The patch for the CVE-2017-3506 vulnerability can be bypassed with other approaches. For example, changing object to void is a typical approach. As this vulnerability is for Bitcoin mining, a PoC can be created via the keyword new for deserialized execution.

Then why code can be executed in the process of parsing XMLDecoder? A dynamic analysis will provide the answer. Use the following PoC as an example.

According to this PoC, a JdbcRowSetImpl instance is first generated. Then the SET method of this instance is called to initialize its attributes. After the setAutoCommit interface is called, a class is remotely loaded and initialized based on the value of dataSourceName. The following figure shows the output of the call stack.

For the preceding PoC, Oracle released the following patch for CVE-2017-10271:

This is quite a complete patch capable of preventing security bypass by imposing restrictions on the use of such fields as object, new, method, void, and array.

Leave a Reply

Your email address will not be published. Required fields are marked *