Rapid7 Observed Exploitation of Adobe ColdFusion | Rapid7 Blog

Last updated at Tue, 27 Feb 2024 17:17:29 GMT

Note: While Rapid7 did not definitively tie the attacker behavior in this blog to a specific CVE at time of publication, as of December 2023 we have observed multiple instances of exploitation of Adobe ColdFusion CVE-2023-26360 for initial access, as well as exploitation of ColdFusion CVE-2023-29300, CVE-2023-29298, and CVE-2023-38203.

Rapid7’s Threat Intelligence and Detection Engineering team has identified active exploitation of Adobe ColdFusion in multiple customer environments. The observed activity dates back to January 2023. IOCs are included below.

Rapid7 has existing detection rules within InsightIDR that have identified this activity and have created additional rules based upon this observed behavior. We have also observed  the compromised website, ooshirts[.]com, being used in other attacks dating back to March 2022.

Attacker Behavior

The earliest time frame of compromise identified thus far occurred in early January 2023. Rapid7 discovered evidence indicating that a malicious actor dropped webshells using an encoded PowerShell command. Process start data indicates that ColdFusion 2018 is spawning malicious commands.

Example base64 encoded command executed by malicious actor through ColdFusion:

Decoded:

Rapid7 Customers

In our current investigations, previously existing and new detections have been observed triggering post exploitation across Rapid7 InsightIDR and Managed Detection & Response (MDR) customers:

Webshell – Possible ColdFusion Webshell In Command Line

This detection identifies common ColdFusion tags being passed in the command line. This technique is used by malicious actors when redirecting strings into files when creating webshells.

Attacker Technique – CertUtil With URLCache Flag

This detection identifies the use of the ‘certutil.exe’ binary with the ‘-urlcache’ flag being passed to it. This technique is used by malicious actors to retrieve files hosted on a remote web server and write them to disk.

Indicators of Compromise

This technique has been observed by malicious actors redirecting strings into files while creating webshells. Look for *.cfm files in ColdFusion webroots containing the following ColdFusion tags:

  • <cfexecute>
  • </cfexecute>

Review process start logs for any abnormal child processes of ColdFusion Server

File items:

TypeValueNotes
FilenameWOW.TXTColdFusion WebShell
Filenamewow.txtColdFusion WebShell
Filenamewww.txtColdFusion WebShell
Filenamewww.cfmColdFusion WebShell
Filenamewow1.cfmColdFusion WebShell
Filenamezzz.txtColdFusion WebShell
Filenamedncat.exeDotNetCat
Filenamenc.exeNetCat
SHA-256e77d6a10370db19b97cacaeb6662ba79f34087d6eaa46f997ea4956e2ad2f245ColdFusion WebShell
SHA-2562482ab79ecb52e1c820ead170474914761358d3cee16e3377fd6e031d3e6cc25ColdFusion WebShell
SHA-25603b06d600fae4f27f6a008a052ea6ee4274652ab0d0921f97cfa222870b1ddc3ColdFusion WebShell
SHA-256be56f5ed8e577e47fef4e0a287051718599ca040c98b6b107c403b3c9d3ee148ColdFusion WebShell
MD51edf1d653deb9001565b5eff3e50824aDotNetCat
SHA-15d95fb365b9d0ceb568bb0c75cb1d70707723f27DotNetCat
SHA-256213079ef54d225c4ca75dd0d57c931bdc613e8c89a2d0dbff88be5b446d231f0DotNetCat
MD5470797a25a6b21d0a46f82968fd6a184NetCat
SHA-1dac7867ee642a65262e153147552befb0b45b036NetCat
SHA-256ce80b839411b1541d09b0ede82f1477b516da0c60760079f46ba4443e1a6f419NetCat

Network-based indicators:

TypeValueNotes
FQDNwww.av-iq[.]comLegitimate Compromised Domain
FQDNwww.ooshirts[.]comLegitimate Compromised Domain
URLhXXps://www.av-iq[.]com/wow.txtColdFusion WebShell
URLhXXps://www.ooshirts[.]com/images/zzz.txtColdFusion WebShell
URLhXXps://www.ooshirts[.]com/images/dncat.exeDotNetCat
URLhXXp://www.ooshirts[.]com/images/nc.exeNetCat

MITRE ATT&CK Tactic/Technique/Subtechniques

TA0042 Resource Development (tactic):

  • T1584 Compromise Infrastructure (technique)
  • T1584.004 Server (sub-technique)

TA0001 Initial Access (tactic):

  • T1190 Exploit Public Facing Application (technique)

TA0002 Execution (tactic):

  • T1059 Command and Scripting Interpreter (technique)
  • T1059.001 PowerShell (sub-technique)
  • T1059.003 Windows Command Shell (sub-technique)

TA0003 Persistence (tactic):

  • T1505 Server Software Component (technique)
  • T1505.003 Web Shell (sub-technique)

TA0011 Command & Control (tactic):

  • T1132 Data Encoding (technique)
  • T1132.001 Standard Encoding (sub-technique)
  • T1572 Protocol Tunneling (technique)

Mitigation Guidance

While we have not tied this behavior back to exploitation of a specific CVE, Adobe released patches for known vulnerabilities in ColdFusion on March 14, 2023. At least one of the CVEs patched in version 16 (ColdFusion 2018) and version 6 (ColdFusion 2021) is known to be exploited in the wild. Rapid7’s vulnerability research team has successfully chained CVE-2023-26359 and CVE-2023-26360 for unauthenticated remote code execution; in-depth analysis and proof-of-concept code is available in AttackerKB here.

We strongly advise ColdFusion customers to update to the latest version to remediate known risk, regardless of whether the behavior we have detailed in this blog is related to recent vulnerabilities. We also advise customers to examine their environments for signs of compromise.

InsightVM and Nexpose customers are able to assess their exposure to known Adobe ColdFusion vulnerabilities via recurring vulnerability check coverage.

Eoin Miller contributed to this article.

Source: https://www.rapid7.com/blog/post/2023/03/21/etr-rapid7-observed-exploitation-of-adobe-coldfusion/