4.9 • 696 Ratings
🗓️ 26 July 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, July 26th, 2018 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich. And today I'm recording from Jacksonville, Florida. |
0:13.2 | Ethereum blockchain explorer site EtherScan.io was affected by a cross-site scripting vulnerability earlier today. Cross-side scripting |
0:23.4 | vulnerabilities, of course, are very common, often underestimated in how they allow full |
0:29.7 | control over a browser visiting the site. Luckily for EtherScan, the attacker didn't |
0:36.7 | actually take full advantage of this vulnerability. |
0:40.2 | The attacker instead just displayed a simple pop-up message alerting the administrators and visitors |
0:46.6 | of this problem. |
0:49.0 | When I heard about this initially, I was concerned that maybe EtherScan did display data from the blockchain |
0:56.2 | without validating it and the result would be the cross-site scripting. |
1:00.6 | Instead, it turned out that the vulnerability was much simpler. |
1:05.7 | They used the popular Discus discussion forum on their site and apparently didn't update to the most recent |
1:14.3 | version which in turn left cross-site scripting vulnerably in Discus active on the site. |
1:22.6 | Lesson learned, make sure you track all of these components that you're including in your site |
1:27.2 | and make sure they are all of these components that you're including in your site and make |
1:28.0 | sure they are adequately patched. |
1:31.2 | Also with cross-site scripting, be happy if NetHacker does actually just display a simple pop-up. |
1:38.9 | And a couple of you have asked about the update that was released this week for Apache Tomcat. Well, turns out two vulnerabilities |
1:47.1 | are being addressed in this update. I didn't cover it earlier because I don't really consider |
1:52.6 | them all that important. One of them, CVE 2018-1336, is a denial of service vulnerability. |
2:02.2 | The second one, 2018-8037 is a bug in how connections are closed and could use to the reuse |
2:11.4 | of user sessions in new connections. |
2:14.9 | Essentially this would allow an attacker that follows an authenticated user |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.