Podcast Detail

SANS Stormcast: File Hashes in MSFT BI; Apache Camel Vuln; Juniper Fixes Exploited Vuln; AMI Patches 10.0 Redfish BMC Vuln

If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9364.mp3

Podcast Logo
File Hashes in MSFT BI; Apache Camel Vuln; Juniper Fixes Exploited Vuln; AMI Patches 10.0 Redfish BMC Vuln
00:00

File Hashes Analysis with Power BI
Guy explains in this diary how to analyze Cowrie honeypot file hashes using Microsoft's BI tool and what you may be able to discover using this tool.
https://isc.sans.edu/diary/File%20Hashes%20Analysis%20with%20Power%20BI%20from%20Data%20Stored%20in%20DShield%20SIEM/31764

Apache Camel Vulnerability
Apache released two patches for Camel in close succession. Initially, the vulnerability was only addressed for headers, but as Akamai discovered, it can also be exploited via query parameters. This vulnerability is trivial to exploit and leads to arbitrary code execution.
https://www.akamai.com/blog/security-research/march-apache-camel-vulnerability-detections-and-mitigations

Juniper Patches Junos Vulnerability
Juniper patches an already exploited vulnerability in JunOS. However, to exploit the vulnerability, and attacker already needs privileged access. By exploiting the vulnerability, an attacker may completely compromised the device.
https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US

AMI Security Advisory
AMI patched three vulnerabilities. One of the, an authentication bypass in Redfish, allows for a complete system compromise without authentication and is rated with a CVSS score of 10.0.
https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf

Podcast Transcript

 Hello and welcome to the Friday, March 14th, 2025
 edition of the SANS Internet Storm Center's Stormcast. My
 name is Johannes Ullrich and today I'm recording from
 Jacksonville, Florida. In today's diary, Guy is talking
 about how to use Microsoft's business intelligence tool,
 Microsoft BI, in order to better understand what's
 happening with binaries uploaded to your honeypot. The
 honeypot uses Kauri. Kauri, of course, is able to collect any
 files that an attacker uploads to the honeypot. We support
 this as an option in the honeypot. But then, of course,
 you also want to go over the data and see if you found
 anything new and interesting. Well, with business
 intelligence, it's fairly straightforward. Guy goes over
 the process to import this file data into business
 intelligence and then slice and dice it, look for
 anomalies, look essentially for odd and interesting things
 using business intelligence. A pretty interesting tool.
 Personally, not that familiar with it. But Guy has been
 using it more and more to look at honeypot data and is pretty
 happy and successful in doing so. And we got an interesting
 vulnerability this week that I probably should have covered
 yesterday. But the things were a little bit messy about. Let
 me describe this a little bit. It's about Apache Camel.
 Apache Camel is an open source integration framework. It
 helps to essentially connect different APIs together. And
 it's quite popular, for example, to orchestrate
 Kubernetes clusters. That being said, well, there was
 recently a fairly simple-to -exploit vulnerability in
 Apache Camel that required you to set a specific header.
 Essentially, all you need to do is add a command to the
 header as a value and then the command will be executed. Now,
 you may say, how can something simple, stupid like this
 happen? Well, the problem was that these headers were only
 supposed to be used sort of internally. And any external
 request with a header like this, well, was supposed to be
 filtered. But the filters were case sensitive. So by being a
 little bit creative with upper lowercase, it was fairly easy
 to bypass these filters and execute commands. Now, doing
 so with filters. The problem, however, was that this fix was
 not complete. It's also possible to exploit
 essentially the same vulnerability by just adding
 this header name and the parameter as a get parameter
 to your request. And that's, of course, a lot easier to
 exploit. Headers, odd headers like this particular, are
 relatively straightforward to filter. Well, once you have
 simple URL parameters and you're able to exploit this
 very trivial arbitrary command execution vulnerability, that
 sort of puts the entire vulnerability at a new level.
 There were initially sort of a little bit of messed up
 vulnerability disclosure process where there were posts
 about this big vulnerability without any details. Well, we
 do have patches available now. Make sure you apply the
 latest, greatest patch that will also fix the parameter
 vulnerability, not just the header vulnerability. So that
 again applies to Apache Camel. And one place to look for it
 is your Kubernetes clusters. But it may show up in all
 kinds of other different pieces of software and such.
 So it's basically one of those integration frameworks,
 middleware type softwares that are often sort of an add-on to
 existing systems. And then we got an out-of-cycle bulletin
 from Juniper. Juniper affixes with this bulletin an already
 exploited vulnerability in JunOS. The vulnerability
 doesn't sound that severe at first because in order to
 exploit, an attacker already has to have a highly
 privileged account and access to the device. On the other
 hand, once an attacker is able to exploit this vulnerability,
 the attacker is essentially able to compromise the
 integrity of the device. So escape any kind of sandboxing
 and such that the user is supposed to be confined to.
 This vulnerability again has already been exploited.
 According to the bulletin, at least one case is known to
 Juniper. However, it's often put together with like some of
 the recent Volt Typhoon attacks and the like. And
 initially sort of has been a little bit labeled as an
 attack against out-of-date routers. But then again, this
 is a current new update for JunOS. So make sure that
 you're not vulnerable. If you're running JunOS Evolved,
 you are not vulnerable to this particular issue. And if
 you're using any systems with AMI BIOS, in particular, if
 they support Redfish, which is sort of an HTML5 remote access
 interface for your system, well, be aware there is an
 update for you likely around there. And it fixes a
 vulnerability with a CVSS score of a perfect 10. This is
 an authentication bypass vulnerability. So as long as
 the Baseboard Management Controller, the BMC interface,
 is exposed to the network, an attacker should be able to
 completely compromise your system. Well, and that's it
 for today. So thanks again for listening. Have a great
 weekend and talk to you again on Monday. Bye.