Handler on Duty: Guy Bruneau
Threat Level: green
Podcast Detail
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9734.mp3
Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation
00:00
My Next Class
| Network Monitoring and Threat Detection In-Depth | Online | Central European Time | Dec 15th - Dec 20th 2025 |
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection)
We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on.
https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Command%20Injection%29/32554
React2Shell: Technical Deep-Dive & In-the-Wild Exploitation of CVE-2025-55182
Wiz has a writeup with more background on the React2Shell vulnerability and current attacks
https://www.wiz.io/blog/nextjs-cve-2025-55182-react2shell-deep-dive
Notepad++ Update Hijacking
Notepad++’s vulnerable update process was exploited
https://notepad-plus-plus.org/news/v889-released/
New macOS PackageKit Privilege Escalation
A PoC was released for a new privilege escalation vulnerability in macOS. Currently, there is no patch.
https://khronokernel.com/macos/2024/06/03/CVE-2024-27822.html
| Network Monitoring and Threat Detection In-Depth | Online | Central European Time | Dec 15th - Dec 20th 2025 |
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
Podcast Transcript
Hello and welcome to the Thursday, December 11th, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Master's Degree Program in Information Security Engineering. Well, in diaries today we do have a detect that I associate with a Kubernetes vulnerability that was patched last year, an OS command injection vulnerability. This vulnerability was a fairly straightforward OS command injection in the node log query feature. Wasn't widely exploited in part because at least at a time this feature was still in beta and wasn't enabled by default. Also, the user in order to attack this feature must have the privileges to actually query logs. Now, the way the exploit works was you just sent essentially data to the logs endpoint and the pattern parameter was injectable. Now, the OS command injection, there are a couple different ways how to often do that with like backtakes or pipes or ampersand. In this case, the attack worked by enclosing the operating system commands in parentheses leading with a dollar symbol. So that very common shell extrapolation that is often used for these types of attacks. Well, today I was actually looking for some React exploits and while sort of going to my logs, I found this other request that reminded me a little bit of this particular Kubernetes vulnerability. So I wonder if it's related. So I wonder if it's related. However, in this case, the OS command injection is not a command line parameter. Instead, it's part of the URL, but it still uses that same dollar parentheses pattern. Also, still at the end of the URL, we have a static string /logs/ just like for the Kubernetes vulnerability. So if anybody has any ideas of what this could be about, let me know. But maybe sort of a slightly different variant of the exploit to hit the same vulnerability or maybe something new and different. And then talking about React to Shell, Wiz has a real nice blog summarizing some of the attacks that are currently going around pretty much matches what we are seeing as well. And also a couple of additional details about this particular vulnerability. One point I think that's important to make here is that currently we do see pretty much all the exploits. So specifically targeting next.js and that's sort of what's also visible then in respective headers and such. So some people may use that to filter requests, which is probably a good idea if you're not using React or next .js. But the problem is that, well, it's not really a next .js vulnerability. The vulnerability is in the React server components and next.js is just the more popular way how these RSCs are exposed. So other components may also expose them. And the exploit may work with some modifications, as Wiz points out, without next.js. But if you're using instead some other additions that are taking advantage of React. Server components. So keep that in mind when you're setting up your filters. Again, these web application firewall filters that are commonly being proposed here, they aren't perfect. They are meant to buy you time. They're not supposed to, well, substitute patching. And then we got a new update for Notepad++. Now, typically I don't talk about Notepad++ updates, but this one fixes an interesting and already exploited security issue. Apparently Notepad++ didn't verify signatures when it downloaded updates. And yes, you know, often you can get away with this. But in this case, it has already been exploited by entities hijacking traffic to Notepad++ servers. So this is the only really significant issue being fixed. And yes, these attacks do happen. So be careful how you are updating your software. Make sure you're verifying any certificates of servers that you may be connecting to, but also verify the executable you're downloading itself by checking respective signatures. And then we have an interesting privilege escalation vulnerability in Mac OS that currently has not been patched yet and is relatively straightforward to exploit. It's actually very similar to an older vulnerability that was patched last year. And I'll link to the older vulnerability in the show notes. The newer one, haven't really seen sort of a decent write-up of it. So sort of bits and pieces across social media. Maybe I'll find something and if so, then I'll add it. But the fundamental problem here is that, of course, when you're running an installer to install some packages, well, the installer runs as root. But the problem is that this installer may then also, well, use resources on the system. And one of these resources is C shell, the default shell on Mac OS. And a user may prepare malicious C profile file that's then being loaded at the beginning of executing C shell. And of course, the user is able to manipulate that file that's owned by the user and can execute commands as root as a result. So interesting little vulnerability. I was actually sort of hoping that Apple would release updates today. They're sort of due to release updates this week. Maybe we'll see them tomorrow. And then I'll point out in case this vulnerability is being addressed. Well, and that's it for today. And thanks again for any likes and recommendations. And this week, as I mentioned before, would be nice if a couple people would leave some good comments with Apple podcast. Let me know if you did so. And that's it for today. Thanks and talk to you again tomorrow. Bye.





