ATI Update ATI-2022-07

New Protocols & Applications (4)

Name Category Info
Apple Stocks Mar 2022 Secure Data Transfer Apple Stocks app provides market activity, performance of stocks you follow, and the latest business news.
DouYin Mobile Mar 2022 Voice/Video/Media DouYin is a Chinese short video sharing application.
GB/T 32960 SCADA GB/T 32960 is a Chinese specification of remote service and management system for electric vehicles.
Nextdoor Mar22 Social Networking/Search Nextdoor is a neighborhood social networking service popular among the North American residential communities.

New Superflows (6)

Name Category Tags Info
Apple Stocks Mar 2022 Secure Data Transfer Financial
SimulatedTLS
SimulatedUDP
Apple Stocks app provides market activity, performance of stocks you follow, and the latest business news.
DouYin Mobile Mar 2022 Voice/Video/Media Streaming
ChinaApp
MobileApp
SimulatedTLS
DouYin is a Chinese short video sharing application. This is the simulation of DouYin iOS version 20.0.0 where the user opens the app and views short videos.
GB/T 32960 SCADA ICS
ChinaApp
Simulates a scenario where a terminal sends vehicle login and realtime status report to server, the server replies responses.
GB/T 32960 Bandwidth SCADA ICS
ChinaApp
Simulates a scenario where around 5MB of vehicle report data is transferred between a terminal and the server.
Nextdoor Mar22 Social Networking/Search Simulates the use of Nextdoor website as of March 22, where the user opens Nextdoor website, logs in, browses the website, and logs out.
Nextdoor Mar22 Browse Social Networking/Search Simulates the use of Nextdoor website as of March 22 where the user browses the website.

New Strikes (2)

CVSS ID References Category Info
9.3 E22-0beo2 CVE-2017-0176CVSSCVSSv3CWE-120 Exploits This strike exploits a heap buffer overflow vulnerability in Remote Desktop on Microsoft Windows XP and Server 2003. The vulnerability is due to a lack of bounds checking while copying a smart card file data. A remote attacker can exploit this vulnerability by sending a crafted request to the target system. Successful exploitation results in arbitrary code execution under the context of SYSTEM.
7.6 E22-ec8j1 CVE-2022-22963CVSSCVSSv3CWE-74URLURL Exploits This strike exploits a remote code execution vulnerability in Spring Cloud Foundation. The vulnerability is due to lack of validation of the values provided in spring.cloud.function.routing-expression header in the HTTP packet. A remote unauthenticated attacker could exploit this vulnerability by embedding a specially crafted Spring Expression Language(SpEL) as a routing-expression in the HTTP packet which could lead to Remote Code Execution on the server. *NOTE: In one-arm, the strike will attempt to create a file named PWNED in the /tmp directory.

Enhancements

Component Info
Security Added smart strike lists Strike Level 1-3 for 2022.
Security A new Evasion has been added in HTTP::ForwardSlashExpand which expands the single forward slash in URL to double forward slash.

Defects Resolved

Comonent Info
Security Fixed HTTP Chunking so that Wireshark dissector can now parse them.
Security The TCP::RandomizeSegmentSize Evasion now varies the segment length for each TCP packet within the defined MSS.
Security Fixed total number of strikes shown in results. Previously, running strikes with some options(combinations of false positives, cache poisoning, multiple iterations) resulted in incorrect number of strikes shown in results.