4.9 • 696 Ratings
🗓️ 4 March 2019
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, March 4, 2019 edition of the Santernet Storm Center's Stormcast. |
0:07.4 | My name is Johannes Ulrich, and I'm recording from Jackstville, Florida. |
0:13.4 | Cisco released a critical update for its RV 110 W.RV. 130W RV-215W routers. |
0:22.8 | These are routers that you typically find in small businesses and maybe some home offices, |
0:30.3 | typically sold via like Office Depot and the like, and the vulnerability can be exploited |
0:36.9 | if you left your web-based admin interface exposed. |
0:42.3 | The existence of the vulnerability was actually already announced late last year at the |
0:47.3 | GeekPone conference, shouldn't be terribly difficult to exploit, so something you certainly |
0:53.3 | should take care of quickly. |
0:56.1 | And then yet again, please block access to any web-based admin interface from outside your own |
1:03.9 | network. |
1:06.6 | And Adobe released an update for Cold Fusion now. |
1:10.4 | Essentially, the nature of the bug here is that the attacker could upload files that are |
1:15.9 | then executed, but you have to do a number of fundamental things wrong with file uploads |
1:23.3 | if you are vulnerable to this particular issue. First of all, of course, you have to have a site that does allow file uploads. |
1:31.3 | The file uploads have to be uploaded into a folder that's web accessible. |
1:37.3 | That's always a big no-no. |
1:39.3 | And then of course, you have to allow the upload of a file that does have an executable extension like |
1:47.5 | dot-cfm, dot-cfml, or dot-cfcfc. Well, ASPX, sort of your typical cold fusion extensions. |
1:56.3 | The real bug here is that if you are checking the mime type of the file, well, that's where |
2:03.1 | the bad part happens. |
2:04.9 | Even if you do check the mime type, well, it can be bypassed and executable code can be uploaded. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.