
SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln
Loading summary
A
Hello and welcome to the Monday, December 8, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ulrich, recording today from Jacksonville, Florida, and this episode is brought to you by the Sans Edu undercredited Certificate program. In Cybersecurity Fundamentals, Xavier lately found a wave of different malicious files that all took a similar route in order to obfuscate some of the code in auto it3. Auto it3 is an automation system. It's quite old, going back to the early 2000s, but it's still being maintained, it's still being updated, and it's still frequently being used to manage Windows systems and essentially create small scripts to automate some tasks on Windows systems. Now, AutoIT 3 has an interesting function called File Install. File Install sounds a little bit like an include function. If the script is parsed, then it's just read from the file system. Now where it gets interesting is once you're running a compiled Auto IT script. And that's kind of one of the advantages of Auto it. It's very easy to create binary executables. So you don't as a malware author, have to first install all of Auto IT on the but you just run the executable or have the victim run the executable. So when it's compiled, then the file is included in the binary at compile time. But what Xavier also saw is that then a temporary file is being created at runtime of the script, which of course then makes it easy to extract that file and analyze it. And Exavier is going a little bit over the different obfuscation techniques being used in this particular example. Let me have a quick update here on the React vulnerability or React to Shell as it has been known under now for the last couple of days. There's a wide range of numbers that's being quoted out there for as many systems are vulnerable. Of course not every system running React or every system running Next JS is vulnerable to this particular issue.
There was a quote there from Palo Alto that they observed 30 organizations being actually compromised. Of course we do see in honeypots another have seen honeypots also many, many exploit attempts and as a result if you are vulnerable, you probably have been exploited. As I mentioned already on Friday, there was also a little sort of side effect of this particular REACT vulnerability and that was a brief Cloudflare outage Friday morning. What apparently happened here is that cloudflare tried to push out a configuration change in order to better detect this vulnerability. There is also a little bit of race going on there trying to find versions of the exploit that bypass web application firewall signatures and part in response to that, cloudflare made changes to their systems that then in the end led to this outage, which I believe lasted about 20 minutes. So keep patching and keep assuming a compromise. Web application firewalls will help, but like I said, there are active efforts to find exploit versions that will bypass web application firewalls. So definitely don't solely rely on your web application firewall. It may buy you time, but it will ultimately probably not prevent exploitation.
I'm not sure how many are familiar with the Apache Tika project, but it is an important project in that it's often used to parse, possibly test file uploads and essentially look at files, whether or not they're potentially malicious. Now the main reason for the Apache Tika library is to extract metadata, and it can do so for an extremely large set of file types, including PDFs. But the vulnerability address now in the Apache Tika core and Apache Tika parsers in particular the PDF module would allow an attacker to submit a malicious PDF that will then lead to an XML external entity attack. So something that you probably want to address in particular if you are using this library to look at malicious PDFs or use them to screen PDFs to possibly detect any malicious content.
Well, and this is it for today. So thanks for listening, thanks for liking, thanks for subscribing, and as always, special thanks for anybody leaving a comment in your favorite podcast platform. That's it, and talk to you again tomorrow. Bye.
Host: Johannes B. Ullrich
Episode Theme:
A concise overview of emerging cybersecurity threats and vulnerabilities, including malware using AutoIT3 FileInstall, an update on the React2Shell vulnerability, and a newly disclosed issue in Apache Tika’s PDF parsing.
“If you are vulnerable, you probably have been exploited.”
— Johannes B. Ullrich [03:10]
“Web application firewalls will help, but like I said, there are active efforts to find exploit versions that will bypass web application firewalls.”
— Johannes B. Ullrich [03:53]
“The vulnerability address(ed) now in the Apache Tika core and Apache Tika parsers, in particular the PDF module, would allow an attacker to submit a malicious PDF that will then lead to an XML external entity attack.”
— Johannes B. Ullrich [04:25]
In this brisk and information-rich episode, Johannes B. Ullrich delivers actionable intelligence on emerging malware and vulnerabilities, emphasizing proactive patching and layered defenses. His tone is clear, urgent, and focused on equipping listeners for real-world threats happening right now.