ATI Update ATI-2021-21

New Protocols & Applications (3)

Name Category Info
Apple Filing Protocol (AFP) Data Transfer/File Sharing Apple Filling Protocol (AFP) is Apple's proprietary network protocol for Mac OSX servers offering file services.
Facebook Marketplace Sep21 Social Networking/Search Facebook Marketplace is a destination for people to discover, buy and sell items. There people can find what they are looking for by filtering their results by location, category and price.
MOXA Nport SCADA MOXA Nport serial device servers are designed to connect RS-xx serial devices to an IP-based Ethernet LAN or the internet.

New Superflows (8)

Name Category Tags Info
Apple Filing Protocol (AFP) Data Transfer/File Sharing This scenario continues as : the AFP Client sends GetStatus command to get information about the AFP Server, DSIOpenSession command to open a Data Stream Interface (DSI) session with the AFP Server, FPLogin command to establish an AFP session, FPLoginCont command for authentication, FPGetSrvrParms command to get different server parameters and FPLogout command to terminates the session with the AFP Server.
Apple Filing Protocol (AFP) Open DSI Session Data Transfer/File Sharing Simulates a scenario where the AFP Client first sends GetStatus command to the AFP Server to get information about the server and then sends DSIOpenSession command to open a Data Stream Interface (DSI) session with the AFP Server.
Facebook Marketplace Sep21 Social Networking/Search Simulates the use of the Facebook Marketplace application as of September 2021 where a user visits the login page, logs into the Facebook application, goes to the marketplace section, views the marketplace feed (page), searches for an item there, filters the results by their prices, clicks on an item, sends a message to the seller for that item and logs out.
Facebook Marketplace Sep21 Filter Items by Price Social Networking/Search Simulates the use of the Facebook Marketplace application as of September 2021 where a user visits the login page, logs into the Facebook application, goes to the marketplace section, views the marketplace feed (page), searches for an item there, filters the results by their prices, clicks on an item and logs out.
Facebook Marketplace Sep21 Send Seller A Message Social Networking/Search Simulates the use of the Facebook Marketplace application as of September 2021 where a user visits the login page, logs into the Facebook application, goes to the marketplace section, searches for an item there, clicks on an item, sends a message to the seller for that item and logs out.
Facebook Marketplace Sep21 Visit Marketplace Social Networking/Search Simulates the use of the Facebook Marketplace application as of September 2021 where a user visits the login page, logs into the Facebook application goes to the marketplace section, views the marketplace feed (page), and logs out.
MOXA Nport SCADA ICS
ChinaApp
Simulates a scenario where MOXA Nport parameters are set with NPort administration suite utility, transmission parameters of COM port1 are set and data transferred via COM port1.
MOXA Nport Bandwidth SCADA ICS
ChinaApp
Simulates a scenario where data transferred via MOXA Nport COM ports.

New Strikes (7)

CVSS ID References Category Info
10.0 E21-053p1 CVE-2016-2005CVSSCVSSv3CWE-121URLZDI-16-245 Exploits This strike exploits a buffer overflow vulnerability in HP Data Protector's Backup Client Service (OmniInet.exe). The vulnerability is due to improper checks on an EXEC_BAR request message. A message with an overly long username parameter will overflow a stack buffer which can result in remote code execution.
10.0 E21-ztnl1 CVE-2014-7169CVSSCVSSv3CWE-78URL Exploits This strike exploits a vulnerability in the GNU Bash also known as ShellShock which allows an attacker to execute arbitrary commands by providing them as functions to an environment variable. This strike exploits this vulnerability through Apache's mod_cgi module. If exploited the vulnerability results in remote code execution in the context of the user running the Apache process. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
10.0 E21-09vw1 CVE-2016-8204CVSSCVSSv3CWE-22ZDI-17-049 Exploits This strike exploits a directory-traversal vulnerability in Brocade Network Advisor. The vulnerability is due to lack of input-validation on the filename paramater for FileReceiveServlet. A remote attacker could exploit this vulnerability to upload arbitrary files and result in arbitrary code execution with privileges of the SYSTEM.
9.0 E21-abo61 CVE-2020-35606CVSSCVSSv3CWE-78URLURLURL Exploits This strike exploits a command injection vulnerability in Webmin. The vulnerability is due to the insufficient validation of input in the Package Updates module. A remote attacker could exploit this vulnerability by sending a crafted request to the target system. Successful exploitation of this vulnerability could result in arbitrary command execution on the target system.
9.0 E21-c95a1 CVE-2021-25646CVSSCVSSv3CWE-502URL Exploits This strike exploits a deserialization vulnerability in Apache Druid. The vulnerability is due to improper deserialization of a JSON data into Java objects. A remote, unauthenticated attacker could exploit this vulnerability by submitting a specially crafted JSON file which could result in arbitrary command execution.
6.8 E21-c5kp1 CVE-2021-21017CVSSCVSSv3CWE-122URL Exploits This strike exploits a memory corruption vulnerability in Adobe Acrobat Reader DC. The vulnerability occurs due to incorrect handling of JavaScript prototype chain. This leads to a heap buffer overflow. An attacker could exploit this vulnerability by enticing a user to open a maliciously crafted PDF document with the vulnerable software, potentially executing arbitrary code.
6.5 E21-17rh1 CVE-2021-2109CVSSCVSSv3CWE-610URLURL Exploits This strike exploits a JNDI injection vulnerability in Oracle Weblogic Server. This vulnerability is due to improper handling user supplied data. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to a vulnerable server. Successful exploitation results in the target server retrieving a potentially malicious serialized object from an attacker controlled server which may lead to the execution of arbitrary code under the security context of the affected server. *NOTE: When running this strike in OneArm mode, the oracle weblogic server will attempt to make a ldap request to a ldap listener(JNDI server) running on localhost to retrieve the serialzed object.

Enhancements

Component Info
StrikeList New Strike List "NetSecOPEN Vulnerability Set".
This strike list contains NetSecOPEN Vulnerability Set strikes.