[bounty] A Struts RCE, Broken Java ECDSA (Psychic Signatures) and a Bad Log4Shell Fix
Description
Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-struts-rce-broken-java-ecdsa-psychic-signatures-and-a-bad-log4shell-fix.html
An intresting mix of issues from crypto (Psychic Signatures), to a bad vulnerability patching service (patching log4shell), and bad logic leading to authentication bypassing and leaking sensitive keys.
[00:00:24 ] Psychic Signatures in Java [CVE-2022-21449]
[00:15:09 ] AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege Escalation
[00:18:33 ] Bypass Apple Corp SSO on Apple Admin Panel
[00:21:55 ] Exploiting Struts RCE on 2.5.26
[00:27:46 ] bluez: malicious USB devices can steal Bluetooth link keys over HCI using fake BD_ADDR
[00:31:20 ] New XSS vectors
The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:
- Mondays at 3:00 pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
- Tuesdays at 7:00 pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec
You can also join our discord: https://discord.gg/daTxTK9
Or follow us on Twitter (@dayzerosec) to know when new releases are coming.