4.9 • 696 Ratings
🗓️ 4 June 2025
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Wednesday, June 4, 2025 edition of the Sands Internet Storm Center's Stormcast. |
0:07.8 | My name is Johannes Ulrich, and in this episode brought you by the Sands.edu Credit Certificate Program in Cybersecurity Leadership. |
0:17.6 | I'm recording in Jacksonville, Florida. |
0:24.9 | Well, in Diaries today, I looked a little bit more at the V-bulletin vulnerability that I mentioned earlier this week and exploits that we observed around |
0:34.3 | this particular vulnerability. V-bulletin again, it's a bulletin board software. |
0:40.3 | It's quite popular. |
0:41.4 | It's a commercial offering, not an open source offering in that sense. |
0:47.0 | It's written in a PHP. |
0:49.8 | And I think this vulnerability really has two sort of interesting aspects that I think haunt a lot of sort of vulnerabilities and also vulnerability mitigation. |
1:02.3 | Now, this vulnerability was first really explained by this particular blog post from Agideo Romano. I think I mentioned the wrong name in the diary |
1:14.6 | originally, but Egideo here is the one that really sort of dove into this patch that the |
1:22.4 | bulletin had released about a year ago and then explained how this particular vulnerability can get exploited. |
1:30.6 | That's sort of really where it gets interesting. |
1:33.0 | So the Bulletin implements an API as so many web applications. |
1:37.5 | And this API does expose specific classes. |
1:43.1 | Now, the problem here is that in PHP version 8.1, how you access particular methods in |
1:51.6 | these classes change somewhat. |
1:53.6 | So methods that you considered being protected, private, not accessible to basically any call from outside the class have now |
2:04.9 | been exposed in PHP version 8.1. Now there's more details to it. It basically uses these |
2:14.0 | reflections which are used to interrogate classes and figure out how to call a particular |
2:20.3 | method. And that's really sort of where the change happened. It's, in my opinion, not a well-documented |
2:25.6 | change. I looked at the 8.1 change flock. Didn't really see it there. But then in the actual |
... |
Transcript will be available on the free plan in 15 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.