Imunify360 web site safety merchandise are affected by a critical vulnerability that would expose hundreds of thousands of websites to hacking.
Imunify360 is designed for Linux-based hosting environments. In accordance with October 2024 information from the seller, Imunify360 had been used to guard 56 million websites.
In accordance with web site safety firm Patchstack, the Imunify360 antivirus is impacted by a flaw that may be exploited to execute arbitrary code and probably absolutely compromise the internet hosting surroundings. An attacker can use a specifically crafted file that triggers the vulnerability when the product scans it.
The vulnerability was lately patched, however Imunify360 developer Cloud Linux Software program has not assigned a CVE identifier.
In an advisory printed on November 4, Cloud Linux Software program knowledgeable clients that the Ai-Bolit malware scanner utilized in Imunify360, ImunifyAV+, and ImunifyAV is impacted by a “crucial safety vulnerability”. A patch has been out there since October 21.
Patchstack reported that details about the flaw has been spreading since late October, however the safety agency can not say whether or not it has been exploited within the wild.
Oliver Sild, co-founder and CEO of Patchstack, advised SecurityWeek that hackers may join shared internet hosting accounts at suppliers that use Imunify360 and deliberately add malware designed to set off the vulnerability.
Code planted contained in the bait malware file could be executed with the elevated privileges of the malware scanner. Commercial. Scroll to proceed studying.
“Shared hosting servers usually service tons of of websites on the similar time, which must be fastidiously remoted from one another as they belong to completely different clients. For the reason that weak malware scanner runs with root privileges, this might doubtlessly give the attacker entry to all websites within the shared server,” Sild defined.
Patchstack has made public technical particulars and a proof-of-concept (PoC) exploit. The safety agency has suggested internet hosting suppliers to test their programs for indicators of compromise.
Associated: New HTTP Request Smuggling Assaults Impacted CDNs, Main Orgs, Hundreds of thousands of Web sites
Associated: Reflectiz Raises $22 Million for Web site Safety Resolution
Associated: 12 months-Outdated WordPress Plugin Flaws Exploited to Hack Web sites
