meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Monday Mar 24th: Critical Next.js Vulnerability; Microsoft Trust Signing Platform Abuse

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 24 March 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Monday Mar 24th: Critical Next.js Vulnerability; Microsoft Trust Signing Platform Abuse

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, March 24th, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:09.6

My name is Johannes Ulrich and I'm recording from Jacksonville, Florida.

0:14.8

Well, we've got an interesting vulnerability to start out with, and actually I wrote a little bit a diary inspired by that vulnerability, but we'll cover

0:23.7

diary and vulnerability sort of here in one.

0:28.3

The vulnerability is in NextJS.

0:31.7

NextJS is framework built around React.

0:36.4

And, well, like so many of these frameworks basically allows you to

0:40.3

write a ton of JavaScript, then a backend components, all of it sort of nicely integrated.

0:47.4

The problem here is how middleware plays into this. So in a modern web application,

0:54.4

it's not just Next.js,

0:55.8

it's, I think, particular,

0:57.9

when you're looking at cloud-based application,

1:01.0

very common,

1:02.0

where a request hardly ever goes directly

1:04.9

to just one web server,

1:07.4

but it's passing through various middleware components or proxies.

1:13.3

These proxies, they can have a number of different functions. The simplest one is just

1:18.5

caching, but then you have more complex things like rewriting headers or authentication.

1:24.7

And authentication is the part that, of course, is specifically of interest to us.

1:30.9

The interesting thing about having middleware take care of authentication is that it really sort

1:36.7

removes some of the dangers of implementing authentication from developers. The way this is usually implemented is that you design certain

1:47.4

paths in the application as requiring authentication or authorization, and that is then being taken

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.