U.S. Department of Defense discloses details about critical and high severity issues

Pierluigi Paganini September 04, 2020

The U.S. Department of Defense has disclosed the details about four critical and high severity vulnerabilities in its infrastructure.

The U.S. Department of Defense has disclosed details of four vulnerabilities in its infrastructure, two high severity rating issues and other two critical flaws.

The vulnerabilities could be exploited by threat actors to hijack a subdomain, execute arbitrary code remotely, or view files on the vulnerable system.

The vulnerabilities were reported in August and July through the Department’s bug bounty program operated via HackerOne.

One of the critical issues is a subdomain takeover due to an unclaimed Amazon S3 bucket.

The ethical hacker chron0x who reported the flaw discovered that the subdomain was referencing an Amazon S3 bucket in the US East region that did no longer exists. The hackers claimed this bucket and successfully took over the subdomain.

“This is extremely vulnerable to attacks as a malicious user could create any web page with any content and host it on the deployedmedicine.com domain.” reads the advisory. “This would allow them to post malicious content which would be mistaken for a valid site. They could:

  • XSS
  • Phishing
  • Bypass domain security
  • Steal sensitive user data, cookies, etc.”

An attacker could exploit the issue to target visitors of the website with phishing and cross-site scripting attacks. 

The second critical flaw is a remote code execution on a DoD server running Apache Solr that had been left unpatched since August 2019.

The vulnerability was reported by the ethical hacker Hzllaga on August 19.

The expert discovered that the server was vulnerable to CVE-2019-0192 and CVE-2019-0193, he successfully exploited CVE-2019-0193 and successfully remotely executed arbitrary code.

One of the high-severity issues disclosed by the Department is an unpatched read-only path traversal in a Cisco product used by the agency. The issue could be exploited to access arbitrary sensitive files on the system.

The second high-severity issue is a code injection on a DoD host that may lead to arbitrary code execution. The flaw was reported by e3xpl0it from Positive Technologies.

The DoD quickly addressed all the vulnerabilities.

Since the DoD launched a bug bounty program on HackerOne in November 2016, it addressed a total of 9555 security issues.

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, U.S. Department of Defense)

[adrotate banner=”5″]

[adrotate banner=”13″]



you might also like

leave a comment