4.9 • 696 Ratings
🗓️ 30 October 2024
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Wednesday, October 30th, 2024 edition of the Sansonet Storm Center's |
0:07.0 | Stormcast. My name is Johannes Ulrich and then I'm recording from Jacksonville, Florida. |
0:13.7 | Well, let's start today with vulnerability in CyberPanel. CyberPanel is one of those web applications that are often used by virtual hosting |
0:23.3 | providers to allow customers to manage their servers so you can enable various services like |
0:30.7 | S-H or FTP if you insist and do it all via a convenient web-based interface. |
0:39.4 | Software like this has had a rich history of vulnerabilities, C-Panel and such is a very similar |
0:46.3 | tool, probably a little bit more used than CyberPanel. |
0:50.0 | And this new vulnerability, which was patched only today, does allow random code execution without authentication. |
1:00.5 | The vulnerability was found by Trey Ant, that's the alias being used here, and was reported to CyberPanel who did release that patch today. |
1:12.6 | I'm not exactly sure how the exact disclosure here worked looks like it was only reported |
1:18.4 | like a week or so ago, so CyberPanel was pretty quick with coming up with a patch for this |
1:25.6 | particular issue, but the blog post by Treyand does also outline some sort of more structural fundamental issues |
1:34.6 | with the software that make it likely that there are other similar vulnerabilities present |
1:41.3 | here. |
1:42.1 | So if you're using CyberPanel, definitely be careful. |
1:46.3 | As usual, try to restrict access, which can be tricky in these situations, and well, |
1:53.0 | maybe learn how to administer your servers with SSH. |
1:58.0 | And sticking with web applications here, we do also have a new fix for vulnerability in Spring. |
2:06.8 | Spring, of course, is one of those components that often pops up with critical vulnerabilities. |
2:12.7 | This one has a CVS score of 9.1. |
2:15.7 | However, the applicability of this particular vulnerability is a little bit |
2:21.2 | more limited. It does affect Spring Web Flux applications that rely on Spring Security |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.