4.9 • 696 Ratings
🗓️ 8 October 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Wednesday, October 8th, 2025 edition of the Sands Internet Storm Centers. |
| 0:11.3 | Stormcast, my name is Johannes Ulrich, recording today from Denver, Colorado. |
| 0:17.4 | And this episode is brought you by the Sands.edu graduate certificate program in incident response. |
| 0:24.7 | In diaries today, I wrote about exploit attempts that we have been seen against free pbX. |
| 0:32.0 | Free pbX is the popular voice over IP system, and it had a critical vulnerability disclosed about two months ago. |
| 0:42.6 | This vulnerability had already been exploited at the time it was disclosed and yes, of course, |
| 0:49.5 | many of these free PbX systems hadn't been patched at the time. |
| 0:54.7 | What we are seeing here is an interesting way to leverage SQL injection |
| 0:59.1 | to actually achieve remote code execution. |
| 1:03.3 | Free pbx maintains a database table called gran jobs. |
| 1:09.8 | That table can be used to essentially add system Cron jobs |
| 1:15.0 | via the Cigle Injection Vulnerability. So the Cicle Injection Vulnerability is just used to |
| 1:20.8 | insert an additional row into this table, which will then launch a Cron job every minute. That Gronjob will create a file in the |
| 1:31.9 | web document root directory that just echoes back, well, that the system essentially vulnerable. |
| 1:38.1 | It does also echo back the output of new name dash A and then deletes the file, deletes itself, which I don't think |
| 1:48.5 | actually makes a big difference because the Grand Shop keeps running and will continuously |
| 1:53.0 | recreate the file. But the file, it's a PHP file, so it's only executed if it's actually |
| 1:58.8 | loaded in a browser. At this point, we haven't really seen any attempts to access this file, but our honeypots |
| 2:06.8 | aren't really sort of claiming to be vulnerable, so it's possible that the attacker figures |
| 2:12.1 | out after trying to deploy this particular file using the vulnerability that the exploit actually didn't |
| 2:21.1 | work. And Microsoft published a very extensive blog post about disrupting threats targeting Microsoft |
| 2:29.8 | Teams. In the first part of this blog post, they are discussing various threats that Teams is |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.