Chinese hackers have unleashed a never-before-seen Linux backdoor::SprySOCKS borrows from open source Windows malware and adds new tricks.

  • epyon22@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    23
    ·
    1 year ago

    CVE-2022-40684 An authentication bypass vulnerability in Fortinet FortiOS, FortiProxy and FortiSwitchManager

    CVE-2022-39952 An unauthenticated remote code execution (RCE) vulnerability in Fortinet FortiNAC

    CVE-2021-22205 An unauthenticated RCE vulnerability in GitLab CE/EE

    CVE-2019-18935 An unauthenticated remote code execution vulnerability in Progress Telerik UI for ASP.NET AJAX

    CVE-2019-9670 / CVE-2019-9621 A bundle of two vulnerabilities for unauthenticated RCE in Zimbra Collaboration Suite

    ProxyShell (CVE-2021-34473, CVE-2021-34523v, CVE-2021-31207) A set of three chained vulnerabilities that perform unauthenticated RCE in Microsoft Exchange

  • photonic_sorcerer@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    12
    ·
    edit-2
    1 year ago

    SprySOCKS Capabilities:

       ID	     NOTES
    
    • 0x09 Gets machine information
    • 0x0a Starts interactive shell
    • 0x0b Writes data to interactive shell
    • 0x0d Stops interactive shell
    • 0x0e Lists network connections (parameters: “ip”, “port”, “commName”, “connectType”)
    • 0x0f Sends packet (parameter: “target”)
    • 0x14, 0x19 Sends initialization packet
    • 0x16 Generates and sets clientid
    • 0x17 Lists network connections (parameters: “tcp_port”, “udp_port”, “http_port”, “listen_type”, “listen_port”)
    • 0x23 Creates SOCKS proxy
    • 0x24 Terminates SOCKS proxy
    • 0x25 Forwards SOCKS proxy data
    • 0x2a Uploads file (parameters: “transfer_id”, “size”)