Paul’s Security Weekly (Video)
Technology
Sonar Vulnerability Researchers Thomas Chauchefoin and Paul Gerste conducted research on the security of Visual Studio Code — the most popular code editor out there — which was presented at DEF CON 31 in August. The pair uncovered a few ways for attackers to gain code execution on a victim's computer if they clicked on a specially crafted link or opened a malicious folder in Visual Studio Code, bypassing existing mitigations like Workspace Trust. Developers tend to trust their IDEs and do not expect such security issues to exist. As developers have access to source code and production systems, they make for very interesting targets for threat actors. Important to note is that the security concepts that the two are able to demonstrate apply not just to Visual Studio Code, but to most other code editors. This is also the story of how the researchers got an unexpected $30,000 bounty from Microsoft for these bugs, by mistake!
Segment Resources:
BLOG POSTS Securing Developer Tools: Argument Injection in Visual Studio Code (https://www.sonarsource.com/blog/securing-developer-tools-argument-injection-in-vscode/) Securing Developer Tools: Git Integrations (https://www.sonarsource.com/blog/securing-developer-tools-git-integrations/)
CVEs CVE-2023-36742 (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36742) CVE-2022-30129 (https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2022-30129) CVE-2021-43891 (https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2021-43891)
Show Notes: https://securityweekly.com/psw-804
TikTok Thefts, Typo Squatting is Lame, Stealing from the TPM, & Codebreaking Letters - PSW #773
Zero Trust ≠ Zero Risk: Leveraging Risk Techniques for Zero Trust Acceleration - Ron Woerner - PSW #773
The RIGHT Software, Docker vs. Root, CORS, Vuln Risk Scoring, & Cisco Attacks - PSW #772
Linux and FOSS Supply Chain Issues - Hal Pomeranz - PSW #772
Super(conductive) Graphene, Yandex Leak, No Fly Lists, & Thinkpad Servers - PSW #771
The Power of Purple Teaming: Using Runbooks to Standardize and Collaborate - Dan DeCloss - PSW #771
GetVariable Strikes Again, Linux Santa, AMD Vulns, & Remote Computer Detonation - PSW #770
How Do We Raise the Floor for Software Quality? - Brian Behlendorf - PSW #770
Real Time Linux, RSA Encryption, Sec vs. Compliance, Cold River, & ChatGPT - PSW #769
Other Considerations for Applying Security into Critical Infrastructure Systems - Kate Stewart - PSW #769
Roblox Prison, 3DS RCE, Puckungfu, Google Home Wiretaps, & Lastpass Hack - PSW #768
Software Supply Chain Security & MITRE's System of Trust - Robert Martin - PSW #768
Holiday Security News & The Holiday Hack Challenge 2022! - PSW #767
Hacker Trivia - PSW #767
How To Get Started in Information Security - PSW #767
Is Penetration Testing Dead? - PSW #767
Ping of Death, 500 Year Old Ciphers, Pwn The Dev, & Chatbot's Order 66 - PSW #766
Severe BMC Vulnerabilities - Nate Warfield - PSW #766
To The Cloud! (Or Not Yet?) - Sinan Eren - PSW #766
Open Source Security - Josh Bressers, Kurt Seifried - PSW #765
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Darknet Diaries