4.9 • 696 Ratings
🗓️ 25 November 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Tuesday, November 25th, 2025 edition of the Sands Internet Storm Center's Stormcast. |
| 0:13.1 | My name is Johannes Ulrich, recording today from Jacksonville, Florida. |
| 0:18.0 | And this episode is brought you by the sands.edu graduate certificate program in incident |
| 0:23.6 | response. Well, today's diary is not some breaking new item for a change, but something that I have |
| 0:31.2 | been seeing more and more lately. And it's nothing really new, but I think worth pointing out and reminding people about, |
| 0:39.6 | and that's how URL mapping and URL-based access control can sometimes lead to gaps in authentication and access control. |
| 0:49.6 | We have seen this lately with the Oracle Identity Manager, we're just adding a little extension, |
| 0:55.9 | sort of cost bypassing off the access control. And then, so it's prompted me to write |
| 1:00.7 | this diary is earlier today, I saw an older vulnerability in the Hitachi, Van Tara, |
| 1:06.9 | Pantau Business Analytics server being exploited. |
| 1:15.8 | Same pattern here as long as you append require.js. |
| 1:18.3 | To the URL, you're good to go. |
| 1:21.6 | You can basically execute whatever you want. And this in this particular case then opens up command injection vulnerability |
| 1:27.0 | that otherwise would be protected |
| 1:29.8 | by authentication. So that's really what's happening here. And the reason behind it is that |
| 1:35.5 | for a range of different URLs, so as long as you have this LDAP 3 Note Children part |
| 1:42.9 | in the URL, it's all going to the same script, and that's sort of |
| 1:46.3 | where the URL mapping comes in. In web servers, you often map your URLs that several |
| 1:53.9 | URLs or range of URLs or any request to particular directory is really processed by the same |
| 1:59.7 | script. So appending things like here require.js does not change what's being executed, |
| 2:07.5 | but it does change your authentication logic. |
| 2:11.4 | And that's really the problem here. |
... |
Transcript will be available on the free plan in 10 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.