4.9 • 696 Ratings
🗓️ 24 May 2022
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, May 24th, 2020 edition of the Sandtonet Storm Center's |
0:06.9 | Stormcast. My name is Johannes Ulrich. And I'm recording from Jacksonville, Florida. |
0:13.8 | Well, I wrote up a recent attack from our honeypots, and that's an increase in scans for a vulnerability in jQuery file upload. |
0:23.9 | This is a popular jQuery extension that allows you to upload files. |
0:29.9 | Has had some vulnerabilities in the past, but the most recent one I found was actually back in |
0:35.6 | 2018. |
0:40.7 | What's sort of interesting here, aside from the fact that over the last week or so, we all of a sudden saw an increase in scans for a jQuery |
0:47.5 | file upload is that it appears to be one specific attacker. Not only is it just one IP address doing it, |
0:55.0 | but it's also a very specific user agent. |
1:00.0 | And that user agent, we have seen it starting last year, |
1:04.0 | always looking for various file upload script. |
1:08.0 | So that appears what this particular attacker is targeting. |
1:13.5 | Allowing users to upload files is always dangerous in particular like jQuery file upload. |
1:20.3 | If you allow the uploads into the document route of your web server, or if you feed the files into third-party tools like |
1:29.7 | Image Magic, for example, for resolution adjustments, or to convert file formats. |
1:36.8 | And for developers, there's actually a nice blog post back from 2018 with these older |
1:42.9 | JQuery file upload vulnerabilities that illustrates how some |
1:47.6 | of these vulnerabilities happen and how they can be exploited. |
1:52.9 | And Oracle today released a special update for Oracle E Business Suite. |
1:57.6 | This is noteworthy because typically Oracle only releases security patches once a quarter. |
2:05.5 | The vulnerability itself does allow the unauthenticated exposure of confidential information, |
2:12.9 | in particular, PII. Now, a footnote also states that authentication may be required, but well, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.