meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday Apr 1st: Apache Camel Exploits; New Cert Authorities Requirements; Possible Oracle Breach

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 1 April 2025

⏱️ 8 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Tuesday Apr 1st: Apache Camel Exploits; New Cert Authorities Requirements; Possible Oracle Breach

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, April 1st, 2025 edition of the Sands and then the Storm Center's Stormcast.

0:09.9

My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:15.7

Well, and today I found some exploit attempts against a recent Apache Camel

0:22.7

War on Ability. Camel is one of those data exchange frameworks. It's

0:27.5

essentially used to make it easier in enterprise systems to shuffle data from

0:33.5

one system to the other, receive the data, manipulated, and so on.

0:39.1

Recently, they published fairly straightforward to exploit vulnerability.

0:45.1

There are two headers in Camel that can be used to execute operating system commands.

0:50.4

That's kind of the point of these headers.

0:53.0

But they're access controlled and they're

0:55.4

checking if these headers are present or not. The only problem is that when they're checking

1:01.0

if the headers are present, they're looking for specific upper lower case patterns. Well,

1:07.2

kind of camel case. And when it's actually then being executed, the case doesn't matter.

1:13.5

So it's pretty straightforward to bypass the filter by just using all lowercase, all uppercase,

1:21.5

something like that. That's not then blocked by the initial check and the operating system commands will still be executed.

1:30.7

At this point, I wouldn't really sort of call what we're seeing as exploited in the wild.

1:36.1

It looks more like vulnerability scans.

1:38.7

Even the one I have here really looked more like sort of an internal vulnerability scan

1:43.4

that ended up in one of our honeypots for some reason.

1:48.8

Could of course be some internal lateral movement or something like this, but I doubt it is they're using a standard vulnerability scanner here

2:01.7

and don't really think that this is actual attack activity,

2:06.7

but just shows it's extremely easy to exploit this vulnerability.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.