4.9 • 696 Ratings
🗓️ 23 July 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, July 23rd, 2018 edition of the Sancturnd Storm Center's Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:12.5 | Last week we had the Oracle Critical Patch update and I noted that there was a new easy-exploitable web logic vulnerability that was addressed with |
0:23.6 | that update. We do have an exploit public now for this vulnerability. That's CVE 2018-2893. |
0:33.1 | And yes, this vulnerability is already exploited in the wild. |
0:39.5 | So time is up, you better already have your systems patched, |
0:44.4 | assure that the system hasn't already been compromised |
0:47.3 | if you find a system that has not yet been patched. |
0:52.6 | Now, the one exploit we have seen being used so far does appear to install a back door. |
0:58.9 | Haven't had really a chance to look at it into too much depth, so it's not just the crypto |
1:05.0 | miners, but they're probably going around already, just haven't really seen a specific one yet. |
1:11.4 | And James Walker of Portswicker noted in a blog post that the most recent version of Microsoft |
1:19.1 | Edge apparently no longer blocks cross-site scripting by default. Starting with InExplorer 8, |
1:26.8 | which I believe was released 2008, Microsoft introduced |
1:30.9 | this feature, which is a very simple, reflective cross-site scripting filter. Essentially, |
1:35.9 | it looks at scripts that you're sending to the server and then obfuscates them if they come |
1:41.5 | back at the browser. The feature itself had some critics. |
1:46.8 | For example, there were some bypass methods, of course, and it sometimes ran into false positives. |
1:53.2 | But overall, it did provide a somewhat meaningful protection against many sort of common cross-site |
2:00.5 | scripting attacks. So it's a little bit |
2:03.0 | odd that it would all for a sudden no longer be working. Haven't had a chance to test it myself yet. |
2:08.9 | And at this point, I haven't seen an official response from Microsoft, whether this was |
2:14.2 | intentional or whether this was a bug. In general, of course, you should never rely on these browser protections. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.