4.9 • 696 Ratings
🗓️ 21 February 2025
⏱️ 12 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, February 21st, |
0:03.5 | 2025 edition of the Sands and at Storm Center's Stormcast. |
0:09.1 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:14.0 | Well, in Diaries today, we had one by Guy showing us how to use the elastic search piped query language in order to do a little bit more |
0:24.3 | interesting queries against Honeypot data using some of the reasoned expansions to that query |
0:32.1 | language. Nice little use of Honeypot data, really just to gain some experience with these query features |
0:38.9 | in a more sane environment before sort of rolling something like this into production |
0:44.1 | and actually deploying it to your Elasticsearch instance and build dashboards around it. |
0:52.0 | Well, and if you're using MongoDB, be aware there is an interesting injection |
0:56.7 | vulnerability. |
0:57.7 | Not calling it here sequel injection, even though some of the write-ups call it that way, |
1:02.4 | but Mongo technically is no sequel, but the vulnerability is very similar. |
1:08.2 | And it's actually not in Mongo itself. |
1:10.1 | Remember, we had recently that Postgres vulnerability, |
1:14.3 | where an associated database had the actual injection problem. |
1:19.2 | Similar here, there is a library called Mongoose. |
1:24.1 | Mongo's is an object data modeling library. |
1:26.7 | It simplifies queries by basically just allowing you to store, retrieve JavaScript objects from MongoDB. Mungoos does then the rewriting into the actual query language. Well, that's going wrong here. There were actually earlier patches late last year that were not sufficient. |
1:47.8 | So definitely make sure that if you're using MongoDB and if you're using Mongo's as sort of that in immediate layer to query MongoDB, that you have everything up to date. |
1:58.6 | Seems true for many of these object relational mapping, object, data mapping, libraries. |
2:06.4 | They abstract a lot of the underlying query languages, |
2:10.9 | but as a result, of course, you're relying on these libraries to do any escaping, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.