Handler on Duty: Xavier Mertens
Threat Level: green
Podcast Detail
SANS Stormcast Monday March 17th: Mirai Makes Mistakes; Compromised Github Action; ruby-saml vulnerability; Fake GitHub Security Alert Phishing
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9366.mp3

Mirai Makes Mistakes; Compromised Github Action; ruby-saml vulnerability; Fake GitHub Security Alert Phishing
00:00
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Mirai Bot Now Incorporating Malformed DrayTek Vigor Router Exploits
One of the many versions of the Mirai botnet added some new exploit strings attempting to take advantage of an old DrayTek Vigor Router vulnerability, but they got the URL wrong.
https://isc.sans.edu/diary/Mirai%20Bot%20now%20incroporating%20%28malformed%3F%29%20DrayTek%20Vigor%20Router%20Exploits/31770
Compromised GitHub Action
The popular GitHub action tj-actions/changed-files was compromised and leaks credentials via the action logs
https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised
ruby-saml authentication bypass
A confusion in how to parse SAML messages between two XML parsers used by Ruby leads to an authentication bypass in saml-ruby.
https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/
GitHub Fake Security Alerts
Fake GitHub security alerts are used to trick package maintainers into adding OAUTH privileges to malicious apps.
https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
Podcast Transcript
Hello and welcome to the Monday, March 17th, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich and today I'm recording from Jacksonville, Florida. First I want to start out today with a quick congratulations to our SANS.edu graduates. We had our commencement in D.C. on Saturday. And well, at this class, the class of 2024, we did graduate almost 500 students. Quite a ways from the early days where we had maybe two, three, five, I think at some of the first years. In diaries this weekend, nothing really earth shattering. Some kind of interesting scans for Traytech Vigor routers. These routers have been attacked for quite a few years now. Actually, 2024, there was a new set of vulnerabilities that was being released. But pretty much ever sort of since 2020, they have been attacked, have been scanned for. What's a little bit different here for these attacks is that they're quite a bit more aggressive than some of the earlier ones. Looks like, you know, some Mirai variant picked up on this. And well, as far as I can tell, they're actually malformed and don't work. Remember, attackers don't have SLAs. If they throw 100 exploits at you, one of them sticks. That's really all they need. So I think they never really noticed that this particular exploit they added here recently doesn't actually do anything. At least that's my opinion here on it. In the cgi-bin part of the URL, they omitted the dash. So it's just cgibin. I don't think that'll work for vulnerable routers. I may be wrong. Please tell me if there is some other exploit or so they're trying to take advantage of here. But we also have a real serious issue to talk about. And that's malicious GitHub actions. tj-actions/changed-files. That's the name of the action. Its intent, as far as I can tell, is just to tell you what files have changed between branches. Of course, quite useful in that respect. But this particular action has been compromised. And it is now logging secrets. This is an issue because these logs are sometimes publicly accessible. In that case, well, an attacker would be able to then retrieve these secrets from the logs. So it's a pretty tricky kind of compromise. They're not connecting anywhere outbound or anything like this. So not that easy detectable. Also, they did go back and retroactively changed a couple of sort of tagged versions. So if your build process automatically does pull a certain version from GitHub, well, you're compromised. Your action will be compromised. This is different from some of these simpler tags that basically just update an action. And then, you know, only if you're using the latest, greatest, newest, you're affected. So if you are using this action, assume that you're compromised. Double check your logs. Check there are no secrets being logged. And definitely remove this action from your workflow. Sounds like 23,000 repositories used this particular action. And the next story also comes from GitHub, but from the GitHub security team. So not a vulnerability in GitHub, but instead a vulnerability discovered by the GitHub security team. It's, again, the ruby-saml implementation. SAML, of course, is built around XML and uses XML parsers in order to verify SAML signatures. The problem is that different XML parsers don't always parse the same document the same way. And this has been an ongoing problem with some of the earlier SAML issues, like how comments, for example, are being interpreted in XML messages. Here, again, this sort of issue of parser differentials strikes. Ruby SAML uses, interestingly, two different parsers. One is REXML and then Nokogiri. Both parsers are being used as part of Ruby SAML. They're then being used to extract information from the XML document from our SAML signatures. And that's sort of where the problems happen. These two parsers don't exactly work alike. And that's how you have an authentication bypass. I'll leave the details to the blog post. It gets a little bit more complicated and a little bit too much for the podcast here to explain. But if you are using Ruby SAML, make sure you update. And, of course, it's one of those components that you may find in various SAML applications. So, definitely, you know, watch out for updates. And since this is already sort of a little bit of GitHub episode, let's cover a third and last GitHub event for today. And that's the use of fake GitHub security warnings in order to trick users to give the attacker OAuth permissions. This kind of OAuth phishing, of course, has been around and has been used against Office 365, for example, a lot. Where an attacker is sending an email that looks legit. You're clicking on it. You're now being directed to the official GitHub page, in this case. And being asked to give this application permissions. If the attacker names your application in a, well, confusing way, then, of course, users will give it permission. They just call their security alert application here. And there are probably others spinning up as we see it. This is an issue, of course, if you are using GitHub. If you're responsible for a particular piece of code for a repository, then you may be at the receiving end of these fake security warnings. Well, and this is it for today. So thanks for listening and talk to you again tomorrow. Bye.