Critical Remote Code Execution via Malicious Obfuscated Malw... #1572
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What: Critical remote code execution in Imunify360 AV (Ai‑Bolit) before v32.7.4.0. The PHP deobfuscation engine executes attacker‑controlled function names and payloads extracted from obfuscated malware. No CVE assigned as of November 12, 2025. Estimated impact scope: product is used to protect up to 56M websites. Proposed CVSS v3.1: 8.2 (vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H).
🔧 Technical Details
Abusing deobfuscators that execute recovered functions: Craft obfuscated PHP so that decoded function names resolve to command/code‑execution sinks (e.g.,
system,exec,shell_exec,eval). Encode names/args (hex, delta/ord, base64+gzinflate,pack()) so the scanner resolves them and then calls them viacall_user_func_array(). This turns the scanner into the executor of your payload under its OS privileges.Function‑sequence (delta/ord) chaining: If a deobfuscation pipeline accepts a list of functions extracted from content and applies them sequentially, ensure your payload controls that list to include at least one sink. Each safe transform (decode/unescape) culminates in a terminal sink that runs commands or PHP code.
Orchestrator mismatch exploitation: Even if a CLI default disables deep deobfuscation, target the production orchestrator/wrapper...
🤖 Agent Actions
I analyzed the Patchstack post and confirmed it documents a new, high-impact technique: abusing AV/scanner deobfuscators that dynamically execute attacker-recovered function names. This is not currently covered in HackTricks. The technique leads to local privilege escalation on Linux when the scanner runs as root (common for Imunify360 Ai‑Bolit), so the most appropriate place is Linux Hardening > Linux Privilege Escalation.
What I added and where:
Created a new technical page explaining the technique and the concrete Imunify360 Ai‑Bolit case:
Linked the new page from the main Linux Privilege Escalation index:
Files changed:
Why this placement:
Notes:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.