New Mirai Version Adds WebSVN Command Injection to Its Arsenal

Published on August 31, 2021
Written by:
Bill Toulas
Bill Toulas
Cybersecurity Journalist

If you haven’t patched CVE-2021-32305 yet, you are currently running the risk of being compromised by the Mirai DDoS malware. The particular vulnerability was discovered and patched in May 2021 and affects the WebSVN subversion repository browser.

At the start of June 2021, a proof of concept exploit was released to the public, and by the end of the month, attacks were already exploiting the flaw. Mirai’s authors are always ready to update their botnet with new exploits, and they have already incorporated the fresh flaw that remains unaddressed in a significant number of deployments.

The WebSVN versions that are vulnerable to exploitation include everything prior to 2.6.1. The problem lies in the possibility of achieving code execution by including special characters in the search query sent to the PHP backend. Because older WebSVN versions don’t sanitize the user input before concatenating it to the other command arguments, an attacker may sneak in command arguments and execute them on the target.

Source: Unit42

The exploit used in the wild uses this command injection flaw to download a shell script that will infect the system with malware. In this case, the malware appears to belong to the Mirai botnet family, packed with a modified version of UPX. After its execution, the malware attempts to connect to its C2 over port 666, and after establishing a connection, it hops to using a custom text-based TCP protocol. From then on, it waits for commands, which can be anything from the following:

All in all, the most solid way to prevent Mirai trouble from your systems would be to upgrade your WebSVN to the latest available version, and this applies to all software you’re using. Remember, malware authors are quick to respond to new discoveries and disclosed vulnerabilities, so one cannot afford to delay patching, not even for a few days.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: