cover of episode [bounty] A Struts RCE, Broken Java ECDSA (Psychic Signatures) and a Bad Log4Shell Fix

[bounty] A Struts RCE, Broken Java ECDSA (Psychic Signatures) and a Bad Log4Shell Fix

2022/4/26
logo of podcast Day[0]

Day[0]

Shownotes Transcript

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/a-struts-rce-broken-java-ecdsa-psychic-signatures-and-a-bad-log4shell-fix.html

An intresting mix of issues from crypto (Psychic Signatures), to a bad vulnerability patching service (patching log4shell), and bad logic leading to authentication bypassing and leaking sensitive keys.

[00:00:24] Psychic Signatures in Java [CVE-2022-21449]

[00:15:09] AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege Escalation

[00:18:33] Bypass Apple Corp SSO on Apple Admin Panel

[00:21:55] Exploiting Struts RCE on 2.5.26

[00:27:46] bluez: malicious USB devices can steal Bluetooth link keys over HCI using fake BD_ADDR

[00:31:20] New XSS vectors

The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:

- Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities

- Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.

The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec

You can also join our discord: https://discord.gg/daTxTK9

Or follow us on Twitter (@dayzerosec) to know when new releases are coming.