Revive Adserver patches vulnerability possibly used to distribute malware

News by Robert Abel

Users urged to update to new software as soon as possible

Revive Adserver, formerly known as OpenX Source, patched two vulnerabilities, one of which may have been used to distribute malware to third-party websites.

The open-source server used by publishers, advertisers, ad agencies and ad networks to run and manage online ad campaigns is urging all of its users to update to the new 4.2.0 version of its software.

One of the vulnerabilities is a deserialisation of untrusted data" flaw while the other is an "Open Redirect" vulnerability, according to the security release.

The first flaw could be used to exploit serialise-related PHP vulnerabilities or PHP object injection as well as to carry out other attacks while the Open Redirect flaw could allow a remote attacker to trick a logged in user to open a specially crafted like that will ultimately redirect them to another destination.

"It is possible, although unconfirmed, that the vulnerability has been used by some attackers in order to gain access to some Revive Adserver instances and deliver malware through them to third-party websites," the security release said referring to the "Deserialisation of Untrusted Data" flaw.

If updating to the most recent version isn’t possible, researchers recommend users delete the adxmlrpc.php, www/delivery/axmlrpc.php and www/delivery/dxmlrpc.php files.

This article was originally published on SC Media US.

Find this article useful?

Get more great articles like this in your inbox every lunchtime

Video and interviews

Interview - Everyone has an Achilles heel: The new security paradigm

How can we defend networks now that the perimeter has all but disappeared?
Brought to you in partnership with ExtraHop