SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday, October 7th, 2025: More About Oracle; Redis Vulnerability; GoAnywhere Exploited

Oct 7, 2025
A newly discovered Oracle 0-day exploit poses serious risks with its widespread availability. The discussion dives into the complexities of the exploit script, highlighting how an XSLT-based technique enables remote code execution. Redis also faced a critical vulnerability, emphasizing the need for prompt patching. Furthermore, Microsoft has revealed active exploitation of a GoAnywhere bug; users are urged to apply patches to safeguard their systems. The session is packed with urgent cybersecurity insights and the importance of proactive defense.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Patch And Isolate Oracle E-Business Suite

  • Apply Oracle's patch for the eBusiness Suite immediately to block known exploit chains.
  • Isolate and block external file downloads to reduce attack surface while you patch.
INSIGHT

Complex Multi-Stage Exploit Chain Revealed

  • The exploit chain uses multiple tricks including directory traversal and an XSLT-based SSRF leading to RCE.
  • The complexity means few understand all facets, but public scripts make copycat attacks likely.
ADVICE

Prepare For Copycat Exploits

  • Expect rapid copycat exploits once public scripts and detailed write-ups appear and act quickly.
  • Monitor your Oracle eBusiness servers and increase isolation to limit exploit facets attackers can reuse.
Get the Snipd Podcast app to discover more snips from this episode
Get the app