Handler on Duty: Guy Bruneau
Threat Level: green
Podcast Detail
SANS Stormcast Friday, March 6th, 2026: Targeted or Not? pac4j-jwt auth bypass; freescout dangerous uploads; MSFT Authenticator vs Graphene OS
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9838.mp3
Targeted or Not? pac4j-jwt auth bypass; freescout dangerous uploads; MSFT Authenticator vs Graphene OS
00:00
My Next Class
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary]
https://isc.sans.edu/diary/Differentiating%20Between%20a%20Targeted%20Intrusion%20and%20an%20Automated%20Opportunistic%20Scanning%20%5BGuest%20Diary%5D/32768
CVE-2026-29000: Critical Authentication Bypass in pac4j-jwt - Using Only a Public Key (CVSS 10)
https://www.codeant.ai/security-research/pac4j-jwt-authentication-bypass-public-key
FreeScout Help Desk Vulnerability
https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-mw88-x7j3-74vc
Microsoft Authenticator Not Supported on Graphene OS
https://www.heise.de/en/news/GrapheneOS-Microsoft-Authenticator-does-not-support-secure-Android-OS-11200495.html
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Friday, March 6, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich and today I'm recording from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Graduate Certificate Program in Cloud Security. Today we got another guest diary from one of our undergraduate interns. This time it was Joseph Gruen's turn to write up some of his observations from a honeypot. Now one of the things about honeypots is that honeypots are usually easy to identify as a honeypot. And they're not typically getting you sort of these zero days or targeted exploits. But they're really measuring sort of the background radiation of the internet as I sometimes call it. Basically sort of all the background noise that you typically end up with from these ubiquitous scans. And Joseph is going over one particular actor like that. What you often have happening here is that these individual scanners are then sort of zooming in on a particular type of exploit, type of artifact they're looking for. Now where this becomes kind of valuable then is also when you're looking at our honeypot network. And the data we publish on the internet storms on our website. If you're getting attacked by an IP address and you wonder, hey is this someone that's only attacking me? Or is this someone that is basically scanning the internet for this particular issue? Well just search for the IP address on the internet storms on our website. And see what our sensors picked up about that IP address and whether the activity that you're seeing is different in some ways. And then sadly we do have another one of those open source library vulnerabilities to talk about that may send you scrambling to figure out which particular systems in your network are using this particular library. The library in question here is the PAC4J JWT library and CodeAnt which is a company that delivers AI tools for code review did find this particular vulnerability. JWT or JWT it's sometimes called or JSON web tokens if you want to spell it out. It is a commonly used format to deliver authentication information. It's basically JSON data that's digitally signed. So it can be used for all kinds of authentication purposes, maybe with OAuth but also sort of in other contexts. The problem has been with JWT like many of these standards is a fairly flexible standards. There were issues where the signature was optional in some cases or a problem and this one is a little bit like it but not quite called algorithm confusion where I can replace asymmetric algorithm with a symmetric algorithm and then I can just use the public key to sign the statement instead of the secret key. That's a little bit like this here. So what happens here is that we do have a JWT JSON web token that's actually not signed. We wrap it in a signature created by using the public key and then the signature works out. It's basically a valid signature and because the token itself doesn't really say that it needs to be signed. So it's easy to exploit and yes Code Ant has released basically all the steps you need in order to make a good and valid token using this vulnerability. There's also this issue a little bit with making the public keys public and well they're called public keys so it shouldn't really be an issue but some implementations are hesitating to this part because of some of these algorithm confusion issues but on the other hand there are many standards around JWT like OpenID and such that require the public keys to be actually public as the name implies. So far patch this vulnerability keeping the public keys secret is probably not the right solution here. The next one I believe we have to talk about is another favorite of mine and that's Unicode FreeScout. It's an open source help desk and shared mailbox solution. Well it has the ability to deal with file uploads and that's what help desks and email systems have to deal with. So not that they can easily get around it but they make sort of a classic mistake here and that's relying on filtering for malicious content by extension. That usually fails and if you then allow unrestricted file uploads as a result you end up with remote code execution. The problem here is white spaces again that can get sort of inserted that really don't change how the extension works and well are then bypassing the .htaccess filters used. If you are allowing people to upload files to your server really the only option is save them outside the document root and then you know pipe them back via some kind of loader script that does not execute any code no matter what the file type is that you're displaying. Well in a few episodes ago I talked about how Microsoft is going to tighten up how it's going to run its Microsoft Authenticator on iOS and on Android by basically not allowing it to run on rooted devices. There's one case where this is causing issues and that's Graphene OS. Graphene OS is a well respected sort of more secure Android version but well it's not Android so it's not being recognized as non-rooted and as a result right now Authenticator will not run on Graphene OS so you pretty much have to run an Android version not Graphene OS version on your phone. Well and this is it for today. Thanks for listening. Thanks for liking. Thanks for commenting in your favorite podcast platform and talk to you again on Monday. Bye. Bye. Bye. Bye. Thank you.





