Jun 13, 2022
When discussing supply chain attacks, it is important to remember that they rely on a trusted third-party vendor who offers essential services or software to the supply chain. If a popular app contains a single vulnerable dependency, every organization that installs from the vendor is equally exposed, possibly affecting millions of users.
Supply chain attack vectors for various packages, such as NPM or Python PyPi, come in a variety of shapes and forms, such as dependency confusion. Among those attack vectors, a simple but dangerous attack is performed by hijacking the package by impersonating the author or maintainer’s Github profile.
Recently, this exact case was demonstrated, where Python CTX and PHP PHPass modules were hijacked in the Python Package Index (aka PyPi or ‘Cheese Shop’), the official third-party software repository for Python.
PyPi is a repository of software for the Python programming language, with open-source code hosted on Github. PyPi helps users find and install software developed and shared by the Python community. This recent exploit, which was done with much ease, resulting in extracting users’ environment variables and AWS credentials, impacts millions of users worldwide.
Read on for what happened, along with corrective actions to take now from Orca Research Pod.
After almost 8 years of inactivity, the Python CTX Module received an unexpected upgrade at the end of May 2022.
The surprising update, which was then discovered to be a full compromise, was actually a few malicious code lines that ultimately were responsible for sending all user environment variables to a remote server.
The community began to follow the story after a Reddit update from a researcher who goes by the name Sockpuppets. The post was titled CTX New Version Released After 7 years (=750K Install), and has since been deleted.
It didn’t take long for the post to begin to trend on Reddit, with users posting their confusion over the supposed “Update”. few hours later, asking, “What I don’t get is that the Github repo displays ‘no updates’ for the last 8 years.”
A Reddit user alerted others with a more thorough message about the questionable discoveries and implications indicating a compromise to PyPi was present.
The issue relies on the Python code in the package content, which allows an attacker to obtain user environment variables, such as AWS, that are then encoded and sent to an endpoint remotely controlled by the attacker.
Let’s look at how the exploit works.
The attacker exploited the OS module, which provides functions for interfacing with the operating system, to retrieve the ENV Variables (such as sensitive API internal endpoints, AWS Keys and Secret etc.) and send them to the remote server. This is a classic scenario of a bad actor just exfiltrating sensitive data back to a controlled remote host, as illustrated above.
Since we were able to discuss dependency confusion in NPM packages in our previous blog, we won’t cover NPM packages, but rather, dependency confusion using Python PyPi packages.
This time, instead of the attacker searching for internal NPM packages and registering them publicly, all the attacker needs to do is create a web crawler which will go through every PyPi package and enumerate each package maintainer’s Github profile page.
In our case, the CTX Module is registered under the email address email@example.com. Sockpuppets, the researcher, noticed that the domain had expired – so he simply purchased the domain and created the above email.
By using Whois to look up the domain, we can see that it was registered on May 14, 2022, not long after the researcher decided to take over the package.
After that, all Sockpuppets had to do was use the PyPi password-reset to reset the password and claim the account.
That’s all there is to it. The attacker now has complete control of the Python CTX module which has the potential to affect millions of people.
The next step is to modify the package version, so for the next time a random user will install the package via pip install ctx, the malicious package will be installed on the host.
In total the PyPi team estimated that 27,000 malicious versions of this project were downloaded from PyPi – with the majority of “overage” downloads being driven by mirrors.
In response to the malicious nature of all release files confirmed, the PyPi administrator took steps to manage the risk from impacting additional users by:
CTX versions 0.2.2 and 0.2.6 (Python)
Similarly to managing Python packages via PyPi, PHP packages are managed by Composer. Using the same technique mentioned above, the researcher was able to identify the popular PHPass package as vulnerable, since its maintainer Github profile does not exist.
In some cases, GitHub will block the options to “revive” old repositories. One way to bypass this is to create a random user, then create the desired repo name, and finally change the username to the original package maintainer.
Just like in Python CTX Case, malicious code was added to the PHPass package – as shown below.
This time, instead of retrieving all environment variables, the researcher focused on AWS credentials, by exfiltrating the AWS_ACCESS_KEY and AWS_SECRET_KEY again back to his remote Heroku endpoint.
Fortunately, the PHP package derived from the compromised repository hautelook/phpass had not seen much use in recent months. Instead, before the harmful code was published, the package for the forked repository bordoni/phpass was beginning to be utilized primarily by developers.
Phpass versions are unknown (PHP), It’s unlikely more than a few dozen users are affected due to the small download count.
The Orca Research Pod recommends the following guidance for DevOps and security teams to protect and defend against any risks associated with this type of compromise.
As zero-day vulnerabilities and new cloud TTPs have evolved in recent years, a strong vulnerability management program can help your team manage the most critical cloud risks of the day fast. Orca’s continuous scanning of multi-cloud environments goes workload deep to scan for vulnerabilities and risks that could impact your organization. All involved teams – from Security Operations, DevSecOps, Developers, and Compliance – can benefit from the unified approach of one cloud security platform that offers seamless visibility across the entire cloud environment, while proactively scanning for vulnerabilities and indicators of compromise, like lateral movement, around the clock.
Ready to see what unlimited cloud visibility is like? Orca Security provides a 30-day free trial that includes a complementary cloud risk assessment that you can use to identify and prioritize remediation of your most critical cloud risks.