Podcast Detail

SANS Stormcast Friday, April 3rd, 2026: Vite Exploits; OpenSSH 10.3; Claude Code Vuln

If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9878.mp3

Podcast Logo
Vite Exploits; OpenSSH 10.3; Claude Code Vuln
00:00

My Next Class

Click HERE to learn more about classes Johannes is teaching for SANS
Network Monitoring and Threat Detection In-DepthAmsterdamApr 20th - Apr 25th 2026
Application Security: Securing Web Apps, APIs, and MicroservicesSan DiegoMay 11th - May 16th 2026
Network Monitoring and Threat Detection In-DepthOnline | Arabian Standard TimeJun 20th - Jun 25th 2026
Network Monitoring and Threat Detection In-DepthRiyadhJun 20th - Jun 25th 2026
Application Security: Securing Web Apps, APIs, and MicroservicesWashingtonJul 13th - Jul 18th 2026
Application Security: Securing Web Apps, APIs, and MicroservicesOnline | British Summer TimeJul 27th - Aug 1st 2026
Application Security: Securing Web Apps, APIs, and MicroservicesLas VegasSep 21st - Sep 26th 2026

Podcast Transcript

 Hello and welcome to the Friday, April 3rd, 2026
 edition of the SANS Internet Storm Center's Stormcast. My
 name is Johannes Ullrich, recording today from Orlando,
 Florida. And this episode is brought to you by the SANS.edu
 Graduate Certificate Program in Incident Response. Today I
 noticed in our honeypots that we are seeing some scans for a
 vulnerability in the developer tool Vite. This vulnerability
 was discovered by Offsec last July and now apparently is
 being exploited. It's fairly straightforward to exploit
 vulnerability, even though I doubt that there will be a lot
 of exposed systems. Typically, this particular tool listens
 on port 5173. Well, this is not where the scans are going
 to. These scans are going to standard HTTP ports. So that's
 the first thing that made me a little bit think that maybe
 they're looking for someone who maybe misconfigured this
 particular tool. The problem with the tool is that it does
 provide access to files on the local file system via simple
 HTTP requests. All you need is a prefix slash at FS slash and
 that will then basically just map to the file system
 disregarding the document route or any settings like
 this. However, there is some access control as is provided
 that basically limits this access to certain directories.
 However, the vulnerability discovered last July does
 allow arbitrary access as long as the URL ends in question
 mark, question mark, raw, question mark. So that
 particular suffix essentially then bypasses the access
 control. If you're running Vite, please make sure that
 you are running it securely, that you're not exposing it
 and that you're also running the latest version. And by the
 way, this tool, well, it's pronounced Vite, but it's
 really sort of a French tool and the spelling is V-I-T-E.
 So some people may pronounce it like Vite or something like
 that. And Open SSH version 10.3 has been released. And with
 that, a number of security issues were addressed. None of
 these security issues I would consider critical or something
 that would require you to patch. Now, if there will be
 an update for your particular Unix distribution or such, of
 course, apply these updates. The one vulnerability that
 sounds critical because, yes, it is an arbitrary code
 execution vulnerability, does require very specific
 configuration. And it also basically only is exploitable
 if the attacker is able to supply a username parameter.
 Plus, you need to have a %U token in your configuration
 that would then be expanded. So highly unlikely that this
 can be sort of leveraged in a real attack. Still, as the
 patch becomes available, just update. And you probably heard
 a couple days ago, Claude Code leaked its source code. This
 wasn't really a compromise per se. It was really just, well,
 being careless in publishing a new version of Claude Code,
 including source maps. But with the source code
 available, now, of course, various researchers are
 looking for hidden features or for vulnerability. Adversa
 found one interesting vulnerability in Claude Code
 that affects the security feature, where a developer is
 able to not allow Claude Code to run certain shell commands.
 And, well, of course, now, Claude Code is all about
 allowing Claude Code to run shell commands.
 But you may want to be a little bit careful here. Then
 this security check is skipped. The problem here,
 apparently, is that the security check would cost too
 many tokens. So it's too costly. And as a result,
 Claude Code just silently skips the security check. So
 be careful with all of these genetic tools. Personally, I
 actually like the idea of using a remote machine for
 development like this. That way, my main work machine is
 not necessarily affected by anything going wrong here
 during development. Well, and this is it for today. So
 thanks again for listening. Thanks for liking. Thanks for
 subscribing. And as always, talk to you again on Monday.
 Bye.