Wallarm changelog
Wallarm changelog
www.wallarm.com

Spring Data MongoDB SpEL Expression Injection Vulnerability (CVE-2022-22980)

 

API Security

  

Background

On June 20, 2022 Spring released Spring Data MongoDB 3.4.1 and 3.3.5 to address a critical CVE report:

CVE-2022-22980: Spring Data MongoDB SpEL Expression injection vulnerability through annotated repository query methods.

This vulnerability was originally reported on June 13, 2022.

Vulnerability

This vulnerability affects Spring Data MongoDB applications using repository query methods that are annotated with @Query or @Aggregation and use parameterized SpEL statements. A specific exploit requires non-sanitized input to the repository query method.

Wallarm Provides Protection

We tested Wallarm’s attack detection against known exploits and have confirmed that they were successfully detected and blocked. No further actions are required when working in blocking mode.

To mitigate this vulnerability when working in monitoring mode, please contact our support team if you want us to create the rule.

Feel free to reach out to support@wallarm.com if you need assistance.

Further updates will be published in Wallarm Changelog: https://changelog.wallarm.com

Update on the Confluence 0-day vulnerability (CVE-2022-26134)

 

API Security

  

We want to share this update regarding the critical Confluence 0-day vulnerability (CVE-2022-26134).

On June 02, 2022 Atlassian released a security advisory for their Confluence Server and Data Center applications, highlighting a critical severity unauthenticated remote code execution (RCE) vulnerability. Exploits are already publicly available and we expect this vulnerability to be heavily exploited in the wild.

We tested Wallarm’s attack detection against the known exploit and confirmed that exploitation attempted are successfully detected and blocked. No further actions are required.

To mitigate the vulnerability when working in a monitoring mode, it’s recommended to create a virtual patch rule based on Confluence recommendation. Feel free to reach out to support@wallarm.com if you need assistance.

Further updates will be published in Wallarm Changelog: https://changelog.wallarm.com

 

API Security

  

Wallarm Node 4.0 released and new SOC 2 Type II report

 

New

  

EN.png

We are pleased to announce the release of a new version of Wallarm Node and the completion of our SOC2 Type II audit.

Here are some highlights on Wallarm Node 4.0.

Deployment

  • New CDN-based Deployment: Spin up new nodes in minutes right on the CDN edge to analyze traffic in the cloud.
  • Token-based Registration: Release 4.0 enables you to register nodes with the token on any supported platform.
  • Improved multi-tenancy mode.

New OS and Kubernetes Support

  • Kubernetes Support: Wallarm Ingress controller is now based on the latest version of Community Ingress NGINX Controller, 1.2.1.
  • New OS Support: Added support for AlmaLinux, Rocky Linux, and Oracle Linux 8.x instead of the deprecated CentOS 8.x.

Attack Detection:

  • Improved Detection: Gain even more accuracy with an updated libdetection library.
  • Customized Blocking Page: New layout and additional debug data.

Potentially Impactful Changes

  • The Wallarm Node now uses port 443 instead of port 444 to connect to the Wallarm Cloud.

Wallarm Node 4.0 also incorporates dozens of other improvements. A more detailed changelog and instructions on safe module upgrade from previous versions are published in the official documentation.

You can request an updated report regarding our latest SOC 2 Type II certification by contacting security@wallarm.com.

If you have any questions, feel free to contact our support team at support@wallarm.com.

Update on 0-day vulnerabilities in Spring (Spring4Shell and CVE-2022-22963)

 

API Security

  

Quick update

  • There are two vulnerabilities: one 0-day in Spring Core which is named Spring4Shell (very severe, exploited in the wild no CVE yet) and another one in Spring Cloud Function (less severe, CVE-2022-22963)
  • Wallarm has rolled out the update to detect and mitigate both vulnerabilities
  • No additional actions are required from the customers when using Wallarm in the blocking mode
  • When working in a monitoring mode, consider creating virtual patches for the Spring Core vulnerability and for the Spring Cloud Function vulnerability

Log4Spring

Spring Framework is an extremely popular framework used by Java developers to build modern applications. If you rely on the Java stack it’s highly likely that your engineering teams use Spring. In some cases, it only takes one specially crafted request to exploit the vulnerability.

On March 29th, 2022, information about the POC 0-day exploit in the popular Java library Spring Core appeared on Twitter. Later it turned out that it’s two RCEs that are discussed and sometimes confused:

Later it turned out that it’s two RCEs that are discussed and sometimes confused:

  • RCE in "Spring Core" (Severe, no patch at the moment) - Spring4Shell
  • RCE in "Spring Cloud Function" (Less severe, see the CVE)

The vulnerability allows an unauthenticated attacker to execute arbitrary code on the target system. Within some configurations, it only requires a threat actor to send a specific HTTP request to a vulnerable system. Other configurations may require additional effort and research by the attacker

At the time of writing, Log4Spring is unpatched in the Spring Framework and there is a public proof-of-concept available. We see exploits in the wild.

Wallarm update

Wallarm automatically identifies attempts of the Spring4shell exploitation and logs these attempts in Wallarm Console.

image.png

Mitigation

When using Wallarm in blocking mode, these attacks will be automatically blocked. No actions are required.

When using a monitoring mode, we suggest creating virtual patches for the Spring Core vulnerability and for the Spring Cloud Function vulnerability.

You can search for the relevant events in Wallarm Console by using Spring4Shell filter.

Feel free to reach out to support@wallarm.com if you need assistance.

Simplified attack grouping in the event list

 

New

  

The new event grouping method enables the grouping of hits originating from the same IP address into one attack that optimizes the view and analysis of attacks generated by bots and third-party scanners.

Generally, a bot or a third-party scanner generates the set of hits with different malicious payloads and sends it from the same IP address. Each such hit is displayed as a separate event in Wallarm Console by default. The number of such hits can reach hundreds or even thousands taking a significant amount of time for its analysis. With the new hit grouping method enabled, hits generated by the bot or third-party scanner can be analyzed as a single entity since they are grouped into one attack.

To enable new grouping of hits, configure the special trigger:

Screenshot 2022-03-22 at 20.47.34.png

Restriction: Hits of the Brute force, Forced browsing, Resource overlimit, Data bomb and Virtual patch attack types cannot be grouped into attacks using the new method.

Wallarm Node 3.6 released

 

New

  

EN_3.6.png

The new version of Wallarm Node is released. We recommend planning an upgrade soon.

The main changes for Node 3.6:

  • Added support for AlmaLinux and Rocky Linux
  • CentOS 8 is no longer supported, as it was declared End-of-Life
  • Wallarm Ingress controller based on the latest version of Community Ingress NGINX Controller 1.1.1
  • Some configuration parameters renamed due to the terminology standardization
  • Updated blocking page /usr/share/nginx/html/wallarm_blocked.html to be displayed in the user's browser when an attack is blocked
  • New configuration parameter to specify the NGINX service port of inside the Docker image

Before upgrading the nodes, please carefully review the list of changes and general upgrade recommendations. If you have any questions, feel free to contact our support team at support@wallarm.com

Update on new DoS security issue in Log4j (CVE-2021-45105)

 

API Security

  

A new Log4j attack vector can potentially lead to the Denial of Service attack and the application crash. CVE-2021-45105 has been issued (the severity for this is classified as High - 7.5).

  • Wallarm Research Team has already verified that the Wallarm attack engine can detect CVE-2021-45105 exploits.
  • Attempts at exploitation will be automatically blocked in a blocking mode. When working in a monitoring mode, consider creating a virtual patch
  • A new fixed version of Log4j (2.17) has been published by Apache. Upgrades are highly recommended.

Update on Log4Shell (CVE-2021-44228)

 

API Security

  

Quick update

  • Wallarm has rolled out the update to detect and mitigate CVE-2021-44228.
  • No additional actions are required from the customers
  • Attempts at exploitation will be automatically blocked in a blocking mode
  • When working in a monitoring mode, consider creating a virtual patch

Log4Shell

A 0-day exploit in the Java core library log4j was discovered that results in Remote Code Execution (RCE) by simple 1-line exploit with JNDI url. Given how ubiquitous this library is, the impact of the exploit (full server control), and how easy it is to exploit, the impact of this vulnerability is quite severe. Read more.

The attack surface is very wide, since it’s almost impossible to find any single Java project without the log4j library enabled. It affects internal services and APIs that are based on Java and uses other API and application data to log them.

Wallarm update

Wallarm automatically identifies attempts of the Log4Shell exploitation and logs these attempts in the Wallarm Console. Corresponding changes have been added within two hours after the first information about CVE-2021-44228 has been published.

image.png

You can search for the relevant events by using filter by CVE:

image.png

Mitigation

When using Wallarm in blocking mode, these attacks will be automatically blocked. No actions required.

When using a monitoring mode, we suggest creating a virtual patch. Feel free to reach out to support@wallarm.com if you need assistance.

Simplified configuration of bruteforce protection

 

API Security

  

It's now easier to configure protection against API abuse, bruteforce or dirbusting attacks. Use an updated interface of Triggers:

  • The Bruteforce trigger defines classic bruteforce attack protection against specific URI based on the number of incoming requests.

  • The Forced browsing trigger forced browsing attacks allows to protect your apps against dirbusting (based on application 404 response codes)

In the simplest case, it is enough to enter the URI when creating the trigger. Wallarm will collect statistics from all the distributed Wallarm nodes deployed across your whole infrastructure.

image.png

When required, you can also use regular expressions (for example. wildcard URLs) or specify specific request headers (such as cookies) using the advanced view. Read more in our documentation.

Note: There is no need to edit your existing rules. However, previous rules “Add forced browsing attack tag to requests”, “Add brute force attacks tag to requests” will no longer be visible in the Rules section.

Wallarm Node 3.4 released

 

New

  

EN_3.4.png

The new version of Wallarm Node is released. We recommend planning an upgrade soon.

The main changes for Node 3.4:

  • Added support for CloudLinux OS 6.x
  • Version of Envoy used in the Wallarm Envoy-based Docker image has been increased to 1.18.4

Wallarm Node 2.18 and lower are no longer supported. Note: Existing nodes will continue to operate as usual. However, we won't provide hotfixes and will limit support requests.

Before upgrading the agents, please carefully review the list of changes and general recommendations. Should you have any questions, feel free to contact our support team at support@wallarm.com.