1. Homepage
  2. Equities
  3. United States
  4. Nasdaq
  5. Rapid7, Inc.
  6. News
  7. Summary
    RPD   US7534221046

RAPID7, INC.

(RPD)
  Report
Delayed Nasdaq  -  05/04 04:00:01 pm EDT
94.71 USD   +0.28%
05:35pRAPID7 : Q1 Earnings Snapshot
AQ
05:10pRapid7 Q1 Net Loss Widens Amid Rising Sales; Shares Fall in Late Trade After Company Projects Q2 Loss
MT
05:00pEarnings Flash (RPD) RAPID7 Posts Q1 Loss $-0.16, vs. Street Est of $-0.16
MT
SummaryQuotesChartsNewsRatingsCalendarCompanyFinancialsConsensusRevisions 
SummaryMost relevantAll NewsAnalyst Reco.Other languagesPress ReleasesOfficial PublicationsSector newsMarketScreener Strategies

Rapid7 : Opportunistic Exploitation of WSO2 CVE-2022-29464

04/22/2022 | 05:19pm EDT

Last updated at Fri, 22 Apr 2022 21:04:01 GMT

On April 18, 2022, MITRE published CVE-2002-29464 , an unrestricted file upload vulnerability affecting various WSO2 products. WSO2 followed with a security advisory explaining the vulnerability allowed unauthenticated and remote attackers to execute arbitrary code in the following products:

  • API Manager
  • Identity Server
  • Identity Server Analytics
  • Identity Server as Key Manager
  • Enterprise Integrator

A technical writeup and proof-of-concept exploit by @hakivvi quickly followed on April 20. The proof of concept uploads a malicious .jsp to /fileupload/toolsAny on the WSO2 product's webserver. The .jsp is a web shell, and due to a directory traversal issue affecting the upload files name, the attacker can write it to a location where they can then send it commands. The attack is not restricted to .jsp files - other researchers, such as our old friend William Vu, have demonstrated exploitation with a war file.

Exploitation is quite easy. The following, modeled after both the original PoC and Vu's, uploads a simple jsp web shell that the attacker will be able to use by visiting https://target:9443/authenticationendpoint/r7.jsp:

echo '<%@ page import="java.io.*" %><% Process p = Runtime.getRuntime().
exec(request.getParameter("cmd"),null,null); %>' | curl -kv -F ../../
../../repository/deployment/server/webapps/authenticationendpoint/r7.
jsp=@- https://10.0.0.20:9443/fileupload/toolsAny

Rapid7's Managed Detection and Response (MDR) team has observed this vulnerability being opportunistically exploited in the wild. Attackers appear to be staying close to the original proof-of-concept exploit and are dropping web shells and coin miners on exploited targets. Victim systems include both Windows and Linux installations of the aforementioned WSO2 products.

Rapid7 recommends remediating this vulnerability immediately per the instructions in WSO2's advisory. If remediation is not possible, remove installations from the publicinternet as soon as possible. Inspect your installation for web shells (.jsp and .class): For example, the original proof of concept will drop the webshell in /authenticationendpoint/ which, when using API Manager on Windows, can be found in C:Program FilesWSO2API Manager3.2.0repositorydeploymentserverwebappsauthenticationendpoint. Additionally, examine the server's http_access log for requests to /fileupload/toolsAny as a possible indication of malicious behavior:

10.0.0.2 - - [22/Apr/2022:15:45:22 -0400] POST /fileupload/toolsAny HTTP/1.1 
200 31 - curl/7.74.0 0.016
10.0.0.2 - - [22/Apr/2022:15:48:46 -0400] POST //fileupload/toolsAny HTTP/1.1 200 31 - python-requests/2.25.1 0.000
10.0.0.2 - - [22/Apr/2022:15:49:13 -0400] POST /fileupload/toolsAny HTTP/1.1 200 32 - python-requests/2.25.1 0.000

Additionally, dropped war files will likely be exploded in the webapps directory (e.g. C:Program FilesWSO2API Manager3.2.0repositorydeploymentserverwebapps). The deployment may create entries such as the following in the wso2carbon log:

TID: [-1234] [r7] [2022-04-22 15:51:32,609]  INFO {org.wso2.carbon.webapp.
mgt.TomcatGenericWebappsDeployer} - Deployed webapp: StandardEngine
[Catalina].StandardHost[localhost].StandardContext[/r7].File[C:PROGRA~1
WSO2APIMAN~132E445~1.0bin..repositorydeploymentserverwebappsr7.war]
Rapid7 customers

Rapid7 InsightIDR customers already have detection rules in place that can identify activity around the exploitation of this vulnerability. Customers should consider reviewing the rule action and priority of the following detection rules. Teams should be ready to investigate any alerts generated from these rules. For Rapid7 MDR customers, the MDR team is monitoring these alerts and will notify you if suspicious activity is detected in your environment.

  • Suspicious Process - Python Downloading and Executing Script
  • Attacker Technique - URL Passed To BitsAdmin
  • Attacker Technique - CertUtil With URLCache Flag
  • Attacker Technique - PowerShell Download Cradles

The Rapid7 Threat Detection and Response team also added the following rule to identify malicious activity specifically related to this exploit:

  • Suspicious Process - WSO2 Product Launches Suspicious Process (added 2022-04-22 19:19 UTC)

We are actively working on development of a vulnerability check for InsightVM and Nexpose customers and will update this blog with further information as it is available.

NEVER MISS A BLOG

Get the latest stories, expertise, and news about security today.

Subscribe

Disclaimer

Rapid7 Inc. published this content on 22 April 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 22 April 2022 21:18:05 UTC.


© Publicnow 2022
All news about RAPID7, INC.
05:35pRAPID7 : Q1 Earnings Snapshot
AQ
05:10pRapid7 Q1 Net Loss Widens Amid Rising Sales; Shares Fall in Late Trade After Company Pr..
MT
05:00pEarnings Flash (RPD) RAPID7 Posts Q1 Loss $-0.16, vs. Street Est of $-0.16
MT
04:59pEarnings Flash (RPD) RAPID7 Reports Q1 Revenue $157.4M, vs. Street Est of $154.1M
MT
04:08pRapid7 Announces First Quarter 2022 Financial Results
GL
04:07pRapid7 Announces First Quarter 2022 Financial Results
AQ
04/26RAPID7 : How to Strategically Scale Vendor Management and Supply Chain Security
PU
04/25VELOCIRAPTOR VERSION 0.6.4 : Dead Disk Forensics and Better Path Handling Let You Dig Deep..
PU
04/22RAPID7 : Opportunistic Exploitation of WSO2 CVE-2022-29464
PU
04/21RAPID7 : Named a Visionary in 2022 Magic Quadrant™ for Application Security Testing ..
PU
More news
Analyst Recommendations on RAPID7, INC.
More recommendations
Financials (USD)
Sales 2022 687 M - -
Net income 2022 -136 M - -
Net Debt 2022 475 M - -
P/E ratio 2022 -40,7x
Yield 2022 -
Capitalization 5 501 M 5 501 M -
EV / Sales 2022 8,70x
EV / Sales 2023 7,06x
Nbr of Employees 2 353
Free-Float 97,8%
Chart RAPID7, INC.
Duration : Period :
Rapid7, Inc. Technical Analysis Chart | MarketScreener
Full-screen chart
Technical analysis trends RAPID7, INC.
Short TermMid-TermLong Term
TrendsBearishNeutralNeutral
Income Statement Evolution
Consensus
Sell
Buy
Mean consensus BUY
Number of Analysts 17
Last Close Price 94,45 $
Average target price 131,13 $
Spread / Average Target 38,8%
EPS Revisions
Managers and Directors
Corey Eugene Thomas Chairman & Chief Executive Officer
Andrew Frank Burton President & Chief Operating Officer
Timothy M. Adams Chief Financial & Accounting Officer
Tas Giakouminakis Chief Technology Officer
J. Benjamin H. Nye Lead Independent Director
Sector and Competitors
1st jan.Capi. (M$)
RAPID7, INC.-19.75%5 501
MICROSOFT CORPORATION-16.22%2 107 442
DASSAULT SYSTÈMES SE-19.95%58 051
ATLASSIAN CORPORATION PLC-41.37%56 828
SEA LIMITED-60.85%49 027
SYNOPSYS INC.-20.70%44 737