Handler on Duty: Didier Stevens
Threat Level: green
Podcast Detail
SANS ISC Stormcast, Jan 28th 2025: Z-Shy Phishing; Apple Patches 0-Day; Fortinet Exploit Details; Github and Apache Solr Patches
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9298.mp3

Z-Shy Phishing; Apple Patches 0-Day; Fortinet Exploit Details; Github and Apache Solr Patches
00:00
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
This episode shows how attackers are bypassing phishing filter by abusing the "shy" softhyphen HTML entitiy. We got an update from Apple fixing a 0-day vulnerability in addition to a number of other issues. watchTowr show how to exploit an interesting FortiOS vulnerability and we have patches for Github Desktop and Apache Solr
An unusal shy z-wasp phish
https://isc.sans.edu/diary/An%20unusual%20%22shy%20z-wasp%22%20phishing/31626
How the soft hyphen "shy" HTML entity can be abused to bypass e-mail filters
Apple Patches
https://support.apple.com/en-us/100100
Apple released patches for all of its operating systems, fixing a 0-day vulnerability among many others issues
Get Fortirekt I am the Super_admin now
https://labs.watchtowr.com/get-fortirekt-i-am-the-super_admin-now-fortios-authentication-bypass-cve-2024-55591/
Details about a recent FortiOS Vulnerability
GitHub Desktop Vulnerability
https://thehackernews.com/2025/01/github-desktop-vulnerability-risks.html
Apache Solr Vulnerability
https://solr.apache.org/security.html#cve-2024-52012-apache-solr-configset-upload-on-windows-allows-arbitrary-path-write-access
Discussion
New Discussions closed for all Podcasts older than two(2) weeks
Please send your comments to our Contact Form
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
Podcast Transcript
Hello and welcome to the Tuesday, January 28, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich and today I'm recording from Jacksonville, Florida. Well, today we have a diary by Jan looking at one of his favorite topics and that's how attackers are bypassing fishing filters. The common trick being used here is often referred to as Z-wasp for zero width characters and there are a number of different spaces, non-breaking spaces and the like that are often used here that are invisible to the user. But a machine looking for keywords like password would not recognize those keywords because they are broken up with these special characters. A particular character that Jan is looking at in this example is the soft hyphen which is why Jan dubs this particular version of the attack the C -Shy attack where S-H-Y is the HTML entity being used for the Shy attack where S-H-Y is the HTML entity being used for the soft hyphen that is then included in these emails in order to obfuscate them and make them similar to these zero white space and other zero with characters. readable to the human but not readable to the machine. Interesting technique and what this really drives home is that yes, we have fancy filters for our email messages that try to identify spam but a sufficiently motivated attacker is probably going to figure out a way around this because there are just so many options to make a text look very different to the machine compared to the user. And Apple today released its usual updates for everything. So we got updates for Vision OS, iOS, iPad OS, we got updates for macOS going back three versions to Ventura or macOS 13. We also got updates for watch watchOS, tvOS and of course Safari for these older versions of macOS. Probably the highlight of this particular release is that there is one already exploited vulnerability that's being patched with this update. It's the first zero day of the year for Apple but of course it's just January. And I think this is the first or second update that we got the period this year. This particular already exploited vulnerability is a privilege escalation vulnerability in Apple's core media framework. This is essentially the library or the set of libraries that's a response for all kinds of media processing with that of course a common source of vulnerabilities. The Apple description is as usual fairly sparse. It says here and I'm reading from Apple a malicious application may be able to elevate privileges. Apple is aware of a report this issue may have been exploited against versions of iOS before iOS 17.2. So if you already ran a current version of iOS you should be good and should not be affected by this vulnerability. Still update and of course with that make sure that you also apply all these other updates that are included. For iOS and iPadOS and the other operating system other than macOS there is no update for prior versions yet. So with that of course you have to also accept any feature updates that you may receive with this particular operating system update. And watchTowr released its usual in-depth review and exploit instructions for the latest Fortinet FortiOS authentication bypass vulnerability. Pretty interesting vulnerability essentially what Fortinet did here is that it did provide a proxy to a local telnet session via WebSocket. And that essentially allows user to gain terminal access via HTTP requests. Authorication of course isn't really done properly. There is a race condition where you can authenticate before the authentication request comes in resulting in empty authentication succeeding. And that gives you then essentially full command line access via this WebSocket connection. Interesting vulnerability definitely something to look at if you are working with WebSockets and do similar things where you are proxying WebSocket connections and relying on some form of authentication across this connection. So you are not running into the same type of race issue that we had here with Fortinet. In other updates we got an update for GitHub Desktop that fixes four different vulnerabilities. There are some credential leak vulnerabilities. Actually the one vulnerability I thought is kind of interesting is not the most severe one. CVSS score only 6.6 but a malicious crafted remote URL could essentially lead to credential leaks. Interesting kind of exploitation options here and probably one that's a little bit hard to get a handle on how critical it's really in your particular environment. And Apache released a noteworthy update for Solr fixing two vulnerabilities. One of them is a directory traversal war on a billion and also an interesting one that allows untrusted users to overwrite trusted config sets. And in the end this could also end up with arbitrary code execution. So definitely apply the patch. And this is it for today this week teaching virtually here for our Cybersecurity East conference. Thanks for listening and talk to you again tomorrow. Bye. Bye. Bye. Thank you.