April 11, 2023, 8 p.m. | DAY[0]

DAY[0] www.youtube.com

Some fun issues this week as we explore code execution in Synthetics Recorder stemming from a comment in the code. An auth bypass in Pentaho leading to RCE via SSTI, car theft via CAN bus message injection, and how to become a cluster admin from a compromised pod in AWK Elastic Kubernetes Service.

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/203.html

[00:00:00] Introduction
[00:00:30] [Elastic] Synthetics Recorder: Code injection when recording website with malicious content
[00:02:45] [Elastic] …

analytics auth bounty bug bug bounty bus business business analytics bypass can bus car car theft cluster code code execution code injection compromised elastic fun injection introduction kubernetes malicious message pentaho podcast rce recording service ssti theft website

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cyber Security Culture – Communication and Content Specialist

@ H&M Group | Stockholm, Sweden

Container Hardening, Sr. (Remote | Top Secret)

@ Rackner | San Antonio, TX

GRC and Information Security Analyst

@ Intertek | United States

Information Security Officer

@ Sopra Steria | Bristol, United Kingdom

Casual Area Security Officer South Down Area

@ TSS | County Down, United Kingdom