GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:45 JST Will Dormann Will Dormann

    If you create an ARM VM in Azure, beware that your "Recently used size" will be ARM, and as such you will not be able to create any preconfigured x64 VMs.

    Because of course if your "Recently used size" is ARM, Microsoft will disable the ability to pick an x64 size. 🤦♂️

    Yes, I had to create a sacrificial x84 VM in Azure to work around this. Once my recently used size was x64, I was able to pick any size that I wanted.

    In conversation about 10 days ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/660/047/299/710/original/b8c83e056a7bd900.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/660/464/816/983/original/b2b5148efbc9de3f.png
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:42 JST Will Dormann Will Dormann
      in reply to

      If we compare pre-patch and post-patch versions of Commvault, we can see that the fix for CVE-2025-34028 is that the endpoints of webpackage.do, deployWebpackage.do, and deployServiceCommcell.do are no longer exempt from authentication. And while they were at it, they removed the web endpoints altogether.

      So yeah, while the CVE entry for CVE-2025-34028 indicates that the vulnerability is a directory traversal, the real vulnerability is (IMO) that an unauthenticated user can install packages on a Commvault server.

      Sure, the directory traversal makes the impact bad. But the underlying problem is that the endpoint can be reached by unauthenticated users. And that's what was corrected with the updates.

      In conversation about 10 days ago permalink

      Attachments



      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/468/688/825/182/229/original/99c3520d4614d87f.png

      2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/468/693/892/317/739/original/6da412ea449794c0.png



    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:43 JST Will Dormann Will Dormann
      in reply to

      Oh, wow.

      Only after pestering the Commvault PSIRT did they update the language of their advisory.

      While it still incorrectly says that 11.38.0 - 11.38.19 are affected and that 11.38.20 is resolved (it is not), the've added a section below this misinformation to convey the actual state of the world:

      11.38.20 is only patched if it has the SP38-CU20-433 and SP38-CU20-436 additional updates installed.

      And 11.38.25 is only patched if it has the SP38-CU25-434 and SP38-CU25-438 additional updates installed.

      I cannot think of a behavior that is more vindictive to their customers to botch language in an advisory so bad, and also to not bother bumping release versions for the fixes for a CVSS 10 EITW vulnerability. 🤦♂️

      In conversation about 10 days ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/464/450/506/092/601/original/f3c0de7a8753837f.png

      2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/464/451/116/329/288/original/814b4ab3c55bf412.png
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:43 JST Will Dormann Will Dormann
      in reply to

      I'll admit that even with the updated explicit instructions on how to get Commvault updates, I fail to see how one can get these mythical SP38-CU25-434 and SP38-CU25-438 optional updates.

      When I first go to "Download or copy software", Commvault tells me that I'm Up-to-date

      If I manually force a download of Latest Fixes for Current Release: 11.38.25, I get an installer that specifies:

      [Image Information]
      Version=11.80.380.0
      ServicePack=38
      SPTranID=6988515
      UnixTime=1732240991
      RevisionNumber=1352
      Tip=1
      ReducedMedia=1

      And if I run this installer and even reboot for good measure, the system is still vulnerable. And the jar that contains the vulnerable code, cv-ac-common.jar has not changed from my original 11.38.25 vulnerable system.

      I'm not particularly good with computers, so hopefully Commvault sysadmins in the real world are better at this than I am. But I'll admit that even with explicit instructions, I have no idea how to get the updates that protect me against CVE-2025-34028.🤷♂️

      In conversation about 10 days ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/464/625/502/384/086/original/45466ea5816f3fef.png

      2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/464/626/098/201/251/original/1e08cf8bfc350eb5.png
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:43 JST Will Dormann Will Dormann
      in reply to

      Ok, after a lenghthy call with Commvault:

      The 11.38 version of Commvault is what's referred to as the "Innovation Release" of the software, where the expectation is that "Pioneer customers" register with Commvault and are specifically approved to even see updates that are available.

      The problem with this:
      Customers who fire up a Commvault 11.38 VM through Azure or the like did not to through the front door of registering with Commvault. As such, they would NOT SEE UPDATES AVAILABLE. This was... not ideal.

      However, based on what the Commvault engineers did on the call that just ended a few minutes ago, they just have changed the backend to provide the "Additional updates" that fix CVE-2025-34028 to weirdos who use Azure such as myself.

      That is, as of about 10 minutes ago, all Commvault 11.38 users can get the fix for CVE-2025-34028 by:

      1. In Manage -> System -> Maintenance, click Download or copy software
      2. Click the Download button (and Next and Run)
      3. In Manage -> Servers, click the ⋮ under Actions and click Upgrade software
      4. Watch the software update.
      5. In Manage -> Servers, click the and click the number next toAdditional updates`
      6. Confirm that you have SP38-CU20-433 and SP38-CU20-436 (if you're runing 11.38.20) or SP38-CU25-434 and SP38-CU25-438 (if you're running 11.38.25).

      NOTE: With the "Innovation Release" (11.38) version of Commvault, the build number does NOT change with the installation of additional updates. That is, 11.38.25 is both vulnerable and not vulnerable to CVE-2025-34028, depending on whether the relevant Additional updates are installed.

      You're all welcome. 😂

      In conversation about 10 days ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        update.in - このウェブサイトは販売用です! - web statistics リソースおよび情報
        このウェブサイトは販売用です! update.in は、あなたがお探しの情報の全ての最新かつ最適なソースです。一般トピックからここから検索できる内容は、update.inが全てとなります。あなたがお探しの内容が見つかることを願っています!

      2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/468/075/556/209/470/original/61c4f9574f0a8b7f.png

      3. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/468/076/315/119/898/original/6e62a1374577e0e1.png

      4. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/468/076/819/936/801/original/90666f2b12463223.png

      5. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/468/077/442/252/044/original/144fd7f313ddbb0d.png
      Steve's Place repeated this.
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:44 JST Will Dormann Will Dormann
      in reply to

      After successfully touching grass and beginning to write up CVE-2025-34028...

      CVE-2025-34028 is a path traversal vulnerability. And yes, the path traversal allows for an unauthenticated attacker to plant files in arbitrary locations. And presumably Commvault has fixed the path traversal part.

      BUT, what about the fact that deployCCPackage() is reachable by design (by way of deployServiceCommcell.do being explicitly listed in authSkipRules.xml)?

      Directory traversal aside, in what world does the ability for an unauthenticated client to deploy a Command Center package make sense, whatever that means? 🤔

      In conversation about 10 days ago permalink

      Attachments


    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:44 JST Will Dormann Will Dormann
      in reply to

      Now that I have a local copy of the Commvault VM so that I don't burn truckloads of Azure dollars, I can look at things at my leisure.

      AND, it seems that the VM that I have is 11.38.25, which contains the fix for CVE-2025-34028.

      EXCEPT the exploit for CVE-2025-34028 still works against it. 🤦♂️

      Commvault claims that 11.38.20 and 11.38.25 fixes the watchTowr-reported CVE-2025-34028 vulnerability. (Aside: How is it even possible that two different versions in the same product line are the ones that fix a single vulnerability?) watchTowr discovered the bug in 11.38.20.

      I trust watchTowr, so I don't believe Commvault's statement that 11.38.20 fixes the vulnerability that watchTowr found in 11.38.20.

      I also trust the PoC that I just ran against 11.38.25, so I don't believe Commvault's statement that 11.38.25 fixes the vulnerability that watchTowr found in 11.38.20.

      Yes, I have trust issues. 😕

      In conversation about 10 days ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/458/901/003/124/252/original/4d7dcf947b77b06c.png

      2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/458/903/072/597/218/original/bc949823bc70c827.png

      3. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/458/905/102/553/591/original/8249341a63d86457.png
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:45 JST Will Dormann Will Dormann
      in reply to

      What's that? I need to remove the number of data disks in my VM? Maybe tell me how to do this?

      Ohhhh... You've selected an Azure VM image that requires more than 4 disks, and the VM type currently selected has only 4 disks? I'm no UI/UX expert, but maybe just TELL ME THIS?

      In conversation about 10 days ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/791/242/538/845/original/68441ab2dff3f3c5.png
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:45 JST Will Dormann Will Dormann
      in reply to

      What's that?

      The "Most used by Azure users" VM type that I picked isn't available?

      You know what, instead of Go Fish, maybe tell me what I can use?

      Edit: Azure Spot pricing apparently isn't a thing. No matter which Size + Region combination you choose, you'll get an error that says that the combo isn't available where you want it. 🤦♂️

      In conversation about 10 days ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/820/926/795/345/original/5559760f76334056.png

      2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/821/371/981/644/original/c122cb0b6873f44a.png
    • Embed this notice
      Will Dormann (wdormann@infosec.exchange)'s status on Thursday, 08-May-2025 13:25:45 JST Will Dormann Will Dormann
      in reply to

      Oh, what's that?
      'NICIPConfigUpdateDeployment-1745511600265' is not valid?

      Oh, let me put my Azure translation hat on. Ok, got it:

      You have exceeded your limit of 10 publicly available IP addresses. Please first Disassociate the IP address and then delete it. Otherwise you will get another error message.

      Boy, this hat is useful.
      Just kidding. There's no such hat.
      You need to trudge through things until you brute-force figure things out.

      Time to go touch grass...

      In conversation about 10 days ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/394/045/439/163/623/original/30076432cca1f602.png

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.