Cybersecurity Podcasts
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityPodcastsSANS Stormcast Wednesday, February 25th, 2026: Open Redirects; setHTML in Firefox; Telnetd Issues
SANS Stormcast Wednesday, February 25th, 2026: Open Redirects; setHTML in Firefox; Telnetd Issues
Cybersecurity

SANS Internet StormCast

SANS Stormcast Wednesday, February 25th, 2026: Open Redirects; setHTML in Firefox; Telnetd Issues

SANS Internet StormCast
•February 25, 2026•7 min
0
SANS Internet StormCast•Feb 25, 2026

Why It Matters

Open redirects and insecure HTML handling remain common attack vectors that can compromise user credentials and enable phishing, making awareness and mitigation critical for web developers. The Telnet environment‑variable flaw highlights how legacy services can still expose high‑impact risks, underscoring the need for proper configuration and patching in modern infrastructure.

Key Takeaways

  • •Honeypots detect surge in open redirect scans.
  • •Open redirects exploit OAuth2 redirect URI manipulation.
  • •Firefox’s SetHTML API mitigates DOM‑based XSS.
  • •Telnetd vulnerability allows environment‑variable credential escalation.
  • •Block bullet‑proof host IPs to reduce redirect attacks.

Pulse Analysis

The latest Stormcast episode highlights a sharp rise in open‑redirect probes observed across the SANS honeypot fleet. Attackers are scanning for poorly validated redirect parameters, a technique that can be weaponized during OAuth 2.0 authorization flows to hijack credential exchanges. While open redirects remain outside the OWASP Top 10, the OWASP cheat sheet offers concrete mitigation steps, and the episode advises blocking traffic from known bullet‑proof hosting IPs that often shelter these campaigns.

Mozilla’s new SetHTML method, part of the Sanitizer API, is presented as a practical defense against DOM‑based cross‑site scripting. By refusing unsafe HTML—especially embedded JavaScript—SetHTML bridges the gap between the dangerously permissive innerHTML and the overly restrictive innerText. The API also integrates with Trusted Types, allowing developers to define precise tag and attribute whitelists. Currently supported in Firefox and Chrome, the feature awaits Safari adoption, which will be pivotal for a truly cross‑browser XSS mitigation standard.

A second vulnerability discussed involves Telnetd’s handling of environment variables. An attacker who can inject a crafted variable, such as the credentials directory path, may gain arbitrary file creation rights and ultimately log in as any user, including root. The recommended fix is to enforce a strict allow‑list of benign variables (e.g., LANG, LC_*) and to block all others, rather than relying on ever‑changing block‑lists. This episode underscores the ongoing risk of legacy services and the need for proactive configuration hardening.

Episode Description

Open Redirects: A Forgotten Vulnerability?

https://isc.sans.edu/diary/Open%20Redirects%3A%20A%20Forgotten%20Vulnerability%3F/32742

https://hacks.mozilla.org/2026/02/goodbye-innerhtml-hello-sethtml-stronger-xss-protection-in-firefox-148/

https://seclists.org/oss-sec/2026/q1/199

Show Notes

0

Comments

Want to join the conversation?

Loading comments...