Handler on Duty: Xavier Mertens
Threat Level: green
Podcast Detail
SANS Stormcast Wednesday Apr 16th: File Upload Service Abuse; OpenSSH 10.0 Released; Apache Roller Vuln; Possible CVE Changes
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9410.mp3

File Upload Service Abuse; OpenSSH 10.0 Released; Apache Roller Vuln; Possible CVE Changes
00:00
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |
Online Services Again Abused to Exfiltrate Data
Attackers like to abuse free online services that can be used to exfiltrate data. From the “originals”, like pastebin,
to past favorites like anonfiles.com. The latest example is gofile.io. As a defender, it is important to track these services to detect exfiltration early
https://isc.sans.edu/diary/Online%20Services%20Again%20Abused%20to%20Exfiltrate%20Data/31862
OpenSSH 10.0 Released
OpenSSH 10.0 was released. This release adds quantum-safe ciphers and the separation of authentication services into a separate binary to reduce the authentication attack surface.
https://www.openssh.com/releasenotes.html#10.0p1
Apache Roller Vulnerability
Apache Roller addressed a vulnerability. Its CVSS score of 10.0 appears inflated, but it is still a vulnerability you probably want to address.
https://lists.apache.org/thread/4j906k16v21kdx8hk87gl7663sw7lg7f
CVE Funding Changes
Mitre’s government contract to operate the CVE system may run out tomorrow. This could lead to a temporary disruption of services, but the system is backed by a diverse board of directors representing many large companies. It is possible that non-government funding sources may keep the system afloat for now.
https://www.cve.org/
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 22nd - Sep 27th 2025 |
Podcast Transcript
Hello and welcome to the Wednesday, April 16th, 2025 edition of the SANS and the Storm Center's Stormcast. My name is Johannes Ulrich and today I'm recording from Orlando, Florida. Xavier today wrote a diary about, well, a little bit of an old problem and that's the abuse of free file transfer services. As Xavier puts it, why create your own complex command control channel if all you need is a simple HTTPS post to a well-known free file hosting service that may even be considered legitimate and as such raise less suspicion than some kind of interesting custom domain. The latest one that Xavier ran into here is gofile.io. Now, Xavier also points out there is an older one that he still keeps seeing and that's anonfile. In a particular piece of software that Xavier actually found here, gofile is used by default, but if gofile fails, it actually then falls back to anon file. Now, the interesting part is that anon file has been disfunct now for a couple of years. As such, falling back to it doesn't really make much sense, but well, this may just be sort of a modification to an existing script. Xavier also lists a few common other domains that are being used for this data exfiltration. So definitely something you do want to pay attention to. In particular, these disfunct services, given that attackers still attempt to use them, putting in some kind of DNS rules or so trying to figure out is someone attempting to connect to them certainly makes some sense for malware detection in your network. And we have a new version of the SSH, Demon Open SSH released version 10.0. Now, this is a functional version update. So while it does provide some security improvements, it doesn't necessarily fix vulnerabilities. There are two major sort of changes from a security point of view. First of all, the addition of quantum safe ciphers. And secondly, there is now a new SSHD Auth Demon that takes care of user authentication. The idea behind this is that the pre-authication attack surface is sort of disassociated from the rest of the SSH Demon. And with that, any problem in this particular code would have less impact of the rest of the SSH Demon. So there's something that you may want to play with. But for the most part, just wait for it to show up in your preferred Linux distribution or whatever other operating system you're using for SSH. No critical need to update to this version right now. And the next vulnerability is, well, a little bit odd in the sense that I don't understand the high CVSS score. And that's really why I want to cover it, because that may be assigned wrongly, or maybe I just don't understand the vulnerability and the software correctly. It's an Apache Roller. That's a Java-based group block software. The problem here is that the vulnerability that's being patched here is that if a user changes their password, their existing sessions are not invalidated. Now, this is not a good thing, because a user may change their password, because they suspect their account being compromised. And with these persistent sessions, an attacker retains access even after the user changed their password. However, assigning it a CVSS score of 10, which is usually the top CVSS score and used for things like unauthenticated vulnerabilities and remote code execution vulnerabilities. I think something went wrong here with the CVSS score. But anyway, if you're using Apache Roller, be aware of the vulnerability. It may be flagged as a big deal. You probably should patch because this is a real vulnerability. Just how urgent you make that, I'll leave that up to you. And if anybody has any feedback on Apache Roller, how this particular CVSS score would be justified, let me know. And then I have another story that really is nothing that I usually cover, because it goes a little bit into politics. Today, a letter from MITRE to the CVE board leaked that apparently, as of tomorrow, MITRE's contract to operate the CVE system may get discontinued, may no longer be funded. What this really means? Well, we don't know yet. It probably does not mean that CVE numbers all for a sudden are going to go away. There are possibilities of other funding sources, like from industry and such. The CVE system itself is operated by MITRE for many years now, I believe since its inception. However, it's backed by a board of, well, large companies and other industry organizations, some of them global, in order to support the mission of CVE numbers and assigning vulnerability IDs. So we'll see what happens. Just there may be at least some temporary disruption in assigning CVE numbers. Well, and this is it for today. So thanks for listening. Thanks for recommending. Thanks for subscribing to this podcast and talk to you again tomorrow. Bye.