HomeCyber BalkansSMB Force-Authentication Vulnerability Affects All OPA Versions on Windows

SMB Force-Authentication Vulnerability Affects All OPA Versions on Windows

Published on

spot_img

A critical vulnerability was recently discovered in Open Policy Agent (OPA) for Windows, which allowed attackers to potentially steal local user NTLM credentials. This vulnerability, tracked as CVE-2024-8260, affected all versions of OPA prior to v0.68.0. By exploiting file-related arguments in the OPA CLI or Go SDK, attackers could inject arbitrary UNC shares, leading to the exposure of sensitive information.

The impact of this vulnerability was significant, as it could compromise the OPA server’s authentication mechanisms and potentially grant unauthorized access to sensitive resources. This posed a serious threat to the security of organizations using OPA for admission control in Kubernetes and other applications.

Researchers pointed out that the vulnerability was due to improper input validation in OPA CLI and Go library functions. By providing a UNC path pointing to a malicious server, attackers could trick OPA into initiating NTLM authentication with the attacker’s server, thereby revealing the user’s NTLM hash. This technique worked with various OPA CLI commands such as eval, run, and eval -d, affecting both the Free and Enterprise editions of OPA.

The OPA Go SDK also contained vulnerabilities that could be exploited to trigger unauthorized network access. Specifically, functions like rego.LoadBundle and AsBundle within the loader.go package did not sufficiently sanitize input paths. By providing a UNC path, an attacker could force the SDK to attempt to load a bundle from a remote share, potentially leading to unauthorized data access or the execution of malicious code.

To address these vulnerabilities, updates were released in the latest version of OPA (v0.68.0) to add checks that prevent the use of UNC paths in the affected functions. Organizations were advised to update their OPA CLI and Go SDK to the latest version to mitigate the risk of credential leakage and unauthorized access.

This incident underscored the importance of security collaboration with engineering teams to identify and address vulnerabilities in widely used open-source projects. It also highlighted the critical need for ongoing security testing and patching to protect against emerging threats and vulnerabilities in software applications.

In conclusion, the patch for the critical vulnerability in OPA has been made available in the latest release, emphasizing the importance of proactive security measures to safeguard against potential threats and unauthorized access to sensitive information.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...