Wednesday, October 9, 2024
HomeCyber AttackJava Usage Tracker Critical Flaw Enable Hackers to Inject Arbitrary Files on...

Java Usage Tracker Critical Flaw Enable Hackers to Inject Arbitrary Files on Windows Systems

Published on

Newly discovered critical vulnerabilities in Java Usage Tracker allows the attacker to run arbitrary files in a vulnerable windows machine and escalate local privileges to access sensitive information.

It also let attackers allow to access the resources that are normally protected or restricted to access it by other applications.

Java Usage Tracker is a part of Java functionality that helps to tracks how it is used in systems where it is installed.

- Advertisement - EHA

Tracking data including log information about the Java virtual machine (JVM) ,Dump the data into a log file, Allow log values for custom properties.

It also uses a Configuration file called usagetracker.properties which is default location on the operating system ->  %ProgramData%\Oracle\Java\.

Java Usage Tracker behavior controlled by 2 properties of usagetracker.properties of following.

  • oracle.usagetracker.logToFile
  • oracle.usagetracker.additionalProperties

According to Trend Micro research, There are two ways to control the behavior of Java Usage Tracker: Setting an arbitrary log path, and setting an arbitrary custom property. Such a combination seems unexploitable, but it can be exploited when used in conjunction with other security flaws or weaknesses.

Exploiting Custom properties of Java Usage Tracker  on Windows

A researcher explained that the configuration files in customized properties code will force to create a .bat file then it will add the custom property.

In this Image end of the properties file ping 172.0.1.1 >= null. In this case, If the batch file global_javatracker.bat is executed, it will display the error message “VM start” is not recognized.

But researchers find that However, there is a chance to execute it because the double quote surrounding every property value can be controlled by another configuration,  com.oracle.usagetracker.quote = “.

create an empty com.oracle.usagetracker.quote configuration and global_javatracker.bat execute command ping 172.0.1.1 >= null.

So once the null file is created, the Java Usage Tracker

  • Can be abused to create files in any arbitrary location in the file system.
  • Can be abused to create text scriptable files. The example uses batch files, but it can also be used to create other file types.
  • Can be abused to inject arbitrary commands (or any other text related to the scriptable file).

An another Local privilege escalate vulnerability in exploit by Java Usage Tracker can be exploit by abusing the default permission.

In this case, Default path %ProgramData%\Oracle\Java\ used to create a Java Usage Tracker global configuration file which is created during the installation of  Java Usage Tracker.

Here the default permission %ProgramData% allows “Users” of the system to create a file. When Oracle/Java’s path is created, the default permissions are inherited.

“So A user with low privileges can create a malicious configuration file usagetracker.properties and the Tomcat server can create the batch file in any location of the system because it is running with “System” privileges.” Researchers said.

Also Read:

Hackers Exploited Facebook Zero-Day Flaw & Stolen 50 Million Accounts Access Tokens

Hackers Selling Facebook Account Logins Details On Dark Web For $3

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Badge and CyberArk Announce Partnership to Redefine Privacy in PAM and Secrets Management

Partnership aims to help businesses eliminate vulnerable attack surfaces and provide a more streamlined...

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windwos Servers

The attackers exploited the EternalBlue vulnerability to gain initial access to the observatory farm,...

Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars

Recent discoveries in the automotive cybersecurity landscape have unveiled a series of critical zero-day...

Likho Hackers Using MeshCentral For Remotely Managing Victim Systems

The Awaken Likho APT group launched a new campaign in June of 2024 with...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windwos Servers

The attackers exploited the EternalBlue vulnerability to gain initial access to the observatory farm,...

Likho Hackers Using MeshCentral For Remotely Managing Victim Systems

The Awaken Likho APT group launched a new campaign in June of 2024 with...

Open-Source Scanner Released to Detect CUPS Vulnerability

A new open-source scanner has been released to detect a critical vulnerability in the...