??ZeroDay jQuery Discovery [NashInjector]: Unveiling a Hidden Threat??
Naushad Hunter
Ph.D Researcher | Ex-Navy Officer | Cyber Defense | Specialist in SOC/SIEM Development | Threat Intelligence | Blockchain, AI Security | Principal Strategist in Electronic Revenue Policy Development | CISO @ AcuityGroup
Dear LinkedIn Community,
I'm reaching out to discuss a critical matter that concerns all of us in the cybersecurity field. There's a vulnerability related to jQuery that has quietly lingered for 12 years (CVE-2011-4969). Despite its long-standing history, it has often been dismissed as low risk, resulting in a lack of updates. However, I've recently made a breakthrough discovery that changes the game entirely.
?? The Vulnerability Transformation
I've identified a new method that allows for obfuscation code injection into .js and .html files, which can potentially compromise websites and facilitate Command and Control (C&C) attacks. This transformation elevates what was once deemed low-risk into a high-severity situation.
?? The Exploit Methodology
Here's how the exploit and attack methodology unfolds in three steps:
1?? Create a Custom Exploit with C2 Control: The attacker crafts a custom exploit, necessitating a C2 server.
2?? Discover Vulnerable jQuery Versions: The attacker identifies the exact vulnerable version of the jQuery file. For this step, I even created a BotNET script for testing, capable of scanning the entire World Wide Web.
3?? Inject Executable Code: The attacker injects executable code into unvalidated inputs within .js or .html files on a website. This allows the attacker to gain complete control over the website, potentially leading to data theft, business disruption, and other malicious activities.
?? The Proof of Concept (POC)
The POC reveals that remote attackers can inject arbitrary obfuscation JavaScript payloads into websites with vulnerable jQuery versions. This can be done without requiring admin privileges or authentication on the targeted website. However, it's essential to note that the exploit can't inject malicious code into files with read-only privileges.
?? The Wider Implications
As of August 2022, jQuery is still heavily utilised, powering 77% of the top 10 million websites. This means that even though this vulnerability was previously underestimated, it presents a significant risk to countless businesses and organisations.
?? Securing the Findings
At this stage, the version of jQuery in question remains classified, and I won't be publishing the exploit publicly. The potential for misuse by malicious actors is far too great.
?? The Question at Hand
My question to the community is whether this discovery should be classified as a zero-day vulnerability. While it was once seen as low-risk, its prevalence in the digital landscape makes it a very critical concern.
Your insights and feedback are highly valued. Let's work together to address this emerging threat and safeguard our online spaces.
?? What Did We Learn from this Discovery? ??
领英推荐
This discovery underscores a critical lesson in cybersecurity. As demonstrated by this example, many businesses and organisations often neglect to patch and update their systems when the risk is perceived as low severity. It's a tendency we must address.
? Mitigating Low Severity Risks: While it's tempting to prioritise high-severity vulnerabilities, low-severity risks, if left unaddressed, can lead to severe consequences. NashInjector highlights the importance of diligently addressing vulnerabilities, regardless of their perceived severity.
?? Business Risk Implications: Neglecting to address even low-severity vulnerabilities can expose businesses to significant risks. In the case of NashInjector, the potential for compromise and the ensuing impact on an organisation's reputation, customer trust, and operations cannot be underestimated.
?? Operational Disruption: The aftermath of an attack can disrupt operations, lead to data breaches, and result in financial losses. This, in turn, may necessitate costly incident response efforts.
?? Security Best Practices: This discovery serves as a reminder of the importance of proactive security measures. Keeping systems up to date and addressing vulnerabilities promptly is crucial for safeguarding data and operations.
?? Stay Informed and Prepared: In today's digital landscape, staying informed and prepared is paramount. Organisations must maintain a vigilant stance against emerging threats and vulnerabilities.
?? A detailed report will be published soon after feedback from the jQuery team, exploring the technical aspects and implications of NashInjector.
?? The Backstory:
?? I have an intriguing backstory to share about my recent discovery. Over the past few days, I encountered a series of perplexing issues with my web browser and computer that prompted this revelation.
My web browser began to freeze, displaying memory usage alerts, and eventually crashing. Oddly, the physical memory usage on my computer would suddenly spike to 80%, with file usage at 60%. In tandem with this, my PC's fan would start running at full tilt, as if my system was undergoing a resource-intensive scan. What made this even more baffling was my usual browsing habits – I typically kept just a few tabs open, often limited to a single homepage. Strangest of all, these disruptions consistently occurred when I visited my own website, which served as my default homepage.
In my efforts to diagnose the problem, I first examined my PC, but I found nothing unusual. Next, I turned my attention to my website. Much to my relief, everything appeared normal.
As someone deeply involved in the field of cybersecurity, I always prioritize keeping my system updated, adhering to OWASP's top 10 recommendations, and promptly applying major patches. However, I must admit that I had deferred some updates for minor, lower-risk vulnerabilities, such as jQuery and my PHP version (7.4). These seemed low-risk, according to assessments by NIST and other evaluators.
My investigation eventually led me to review system logs, where I began to uncover a trail of unusual activities. I found evidence of new folder creations and file modifications that raised my suspicion. It was at this point that I realized something was amiss, and I decided to dig deeper.
The key takeaway from this experience is a valuable lesson in not dismissing low-severity vulnerabilities. It serves as a reminder not to solely rely on labels like CWEs, CVEs, or CVSSs when evaluating risks. Sometimes, what may appear as low-severity can have hidden consequences, and it's akin to the age-old adage – 'Don't judge a book by its cover.'
This experience has reinforced my belief in the importance of thorough scrutiny and vigilance in the realm of cybersecurity. It also underscores the significance of staying current with updates, even for vulnerabilities that may seem less critical on the surface.
Thank you for taking the time to read about my journey, and I hope this story encourages others to remain diligent in their cybersecurity efforts, irrespective of perceived risk levels...(This investigation still ongoing....)
?? Finally,
?? What is NashInjector? The name of the jQuery Zeroday discovery is call "NashInjector." It cleverly combines my name, "Naushad" (Nash), with the concept of code injection, effectively conveying the essence of the discovery. This name is not only unique but also holds significant meaning, making it a memorable and impactful branding choice for this groundbreaking discovery.
---
This expanded section emphasises the importance of addressing vulnerabilities, even if they are perceived as low severity, and discusses the potential business risks associated with such negligence.
#NashInjector #Cybersecurity #Vulnerabilities #ZeroDay #jQueryThreat #DigitalSecurity
Founder and Inventor @ Tutamantic_Sec (threat model training, automation, integration)... open-source Rapid Threat Model Prototyping methodology (RTMP)... RSA, ThreatModCon speaker
1 年Hey Naushad Hunter, nice research!!! This points very clearly to the need to push for deprecation of the use of JQuery. Much of JQuery's use-case was for cross-compatibility between browsers before the advent of many of the modern web standards we now have. This will also have the added benefit of reducing code complexity hopefully... in addition to the removal of this attack vector that you have researched. You also stated that your exploit works on all known browser versions so pushing for the removal of JQuery as a library could be a good alternative mitigation.
i am still hiring
CSIR | Detection Engineering | Threat Hunting | Automation
1 年Hey Naushad Hunter can you share more detail in the PKC group chat?