Detecting jQuery File Upload vulnerability using Falco (CVE-2018-9206)
Blog post from Sysdig
A recently disclosed vulnerability in the popular jQuery File Upload plugin, identified as CVE-2018-9206, allows malicious users to upload and execute files on a server, potentially leading to a complete takeover of the host. The vulnerability arises from a change in Apache's Web Server security settings, which exposes users to unrestricted file upload risks. Detecting this vulnerability can be challenging due to the plugin's widespread use and the potential for it to be embedded in third-party applications without clear indications. Falco, a behavioral detection system, can help identify suspicious activities by leveraging a rich stream of data from system events and implementing pre-defined rules to detect potential exploits. Beyond detection, Falco and Sysdig Secure offer tools for analyzing incidents and implementing active enforcement measures, such as node tainting or process termination, to mitigate threats. The combination of detection and response capabilities is crucial for security practitioners, particularly in containerized environments where incidents may occur within ephemeral containers.