meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Friday, March 28th: Sitecore Exploited; Blasting Past Webp; Splunk and Firefox Vulnerabilities

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 28 March 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Friday, March 27th: Sitecore Exploited; Blasting Past Webp; Splunk and Firefox Vulnerabilities

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, March 28, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:08.5

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.3

Well, the last couple of days I spent a little bit time on creating a couple new reports for the Internet Storm Center website.

0:20.7

One of them summarizes

0:22.6

HTTP headers. And the reason I started looking more at HTTP headers was of course Next.js

0:28.6

and the header-related vulnerability. We didn't, we collected the headers from our honeypots, but didn't really sort of routinely look at them.

0:38.9

And, well, with these new reports, actually, I immediately sort of spotted one interesting

0:44.4

header here, and that's the Thumbnail Access token header. Only a couple of requests this last

0:51.3

month with this particular header being set.

0:55.9

Well, a little bit researched and showed that this actually attempts to exploit a vulnerability in SightCore.

1:03.9

SiteCore is CMS and it uses this header for access control.

1:10.1

The problem, however, is that the content of the header,

1:13.0

the value is actually a dot-net object.

1:15.9

And then it uses the binary formatter class

1:20.4

to actually extract data from this object,

1:24.8

and that class is most famously known for being, well, subject to deseralization

1:33.3

vulnerabilities. And that's exactly what's happening here. There was a couple weeks ago,

1:39.3

a blog post by Searchlight Cyber. They initially discovered the vulnerability.

1:46.2

The vulnerability was actually patched back in January, as far as I can tell, but not a lot

1:52.1

of details were released by SiteCorp at the time.

1:56.8

Now with the blog from Searchlight Cyber, we do have a proof of concept exploit.

2:02.4

The one problem from our data is that we are only recording the first 250 characters of header

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.