Imunify 360 Bug Could Deserialize PHP

A severe PHP deserialization vulnerability leading to code execution has been patched in Imunify360. 

Imunify360 is a security platform for web-hosting servers that allows users to configure various settings for real-time website protection and web server security like advanced firewall, intrusion detection and prevention, antivirus and antimalware scanning, automatic kernel patch updates, and a web-host panel integration for managing it all.

Advertisements

Tracked as CVE-2021-21956 and issued a CVSSv3 score of 8.2, the security flaw is present in Cloud Linux’s Imunify360 versions 5.8 and 5.9.

The Ai-Bolit component is used to scan and check website-related files, such as .php, .js, or .html content, and is installed natively as a service with root privileges. Within a deobfuscation class of the module, a failure to sanitize data that has been submitted means that arbitrary code execution can be performed during unserialization.

A specially crafted malformed file can lead to potential arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability

if Imunify360 is configured with real-time file system scanning, the attacker need only create a malicious file in the system, they noted. Or the attacker could also provide a malicious file directly to the target, which would trigger an exploit when a user scans it with the Ai-Bolit scanner.

Advertisements

Users are encouraged to update these affected products as soon as possible: Cloud Linux Inc. Imunify360, versions 5.8 and 5.9 to version 6.1.

The following SNORT rules 58252 and 58253 will detect exploitation attempts against this vulnerability

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.