SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Friday, April 3rd, 2026: Vite Exploits; OpenSSH 10.3; Claude Code Vuln

Apr 3, 2026
Scans targeting a Vite file-access flaw and how attackers bypass controls to read files. New OpenSSH 10.3 release highlights and a rare operator code execution caveat. A source map leak from Claude Code led researchers to find a whitelist bypass that can allow dangerous commands after a threshold.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Patch And Lock Down Vite Instances

  • Do ensure Vite instances are not publicly exposed and update to the latest patched version.
  • Check for misconfigurations: Vite commonly listens on port 5173 but scans were targeting standard HTTP ports, indicating exposed or misrouted installs.
INSIGHT

Vite File Access Bypass

  • Vite developer tool exposes local files via simple HTTP FS paths by default.
  • A URL suffix ending with ??raw bypasses access controls and yields arbitrary filesystem access, observed in honeypot scans.
ADVICE

Update OpenSSH Sensibly

  • Apply OpenSSH updates when your OS/distribution provides them but prioritize based on your configuration exposure.
  • Don't panic-patch immediately unless you use the rare percent-token username expansion configuration described.
Get the Snipd Podcast app to discover more snips from this episode
Get the app