#SecurityFlaw

N-gated Hacker Newsngate
2025-04-17

🚨 BREAKING: Security flaw discovered in Erlang/OTP SSH server, but don't worry, you can't read about it because the server is too busy playing hide and seek with its own responses. 🙈🔐 Meanwhile, the tech world collectively pretends this is the first time a server has dropped the ball. 😂
nvd.nist.gov/vuln/detail/CVE-2

2025-04-11

Noticed an unexpected 'inetpub' folder on your Windows PC? Microsoft’s latest update is creating it to tackle a serious security flaw. Curious how a routine update turned into a security mystery?

thedefendopsdiaries.com/unders

#inetpub
#windowsupdate
#securityflaw
#microsoft
#cve202521204

N-gated Hacker Newsngate
2025-03-08

🚨Wow, someone discovered a security flaw! All hail the tech hero who bumbled upon a bug in software made to be unhackable.🛡️ It’s like accidentally finding a secret passage in a LEGO castle—totally intentional and absolutely deserving of a blog post with a self-indulgent menu.🍽️
mattsayar.com/how-i-hacked-my-

"He included a PoC that caused the ChatGPT app for macOS to send a verbatim copy of all user input and ChatGPT output to a server of his choice. All a target needed to do was instruct the LLM to view a web link that hosted a malicious image. From then on, all input and output to and from ChatGPT was sent to the attacker's website."

arstechnica.com/security/2024/

#ChatGPT #SecurityFlaw

Iulian Virgil Oliveira Strutiulianvostrut
2024-09-12

GitLab has patched a critical flaw that could enable attackers to execute pipeline jobs as arbitrary users, posing a severe risk to development environments. This is the fourth critical flaw patched by GitLab in the past year.

Iulian Virgil Oliveira Strutiulianvostrut
2024-08-20

Looks like the Azure WireServer became the not-so-invincible WireWeakness. Time for the Azure team to step up their game and secure those clusters!

eicker.news ᳇ tech newstechnews@eicker.news
2024-07-05

»#OpenAI’s #ChatGPT #Macapp was storing conversations in plain text: After the #securityflaw was spotted, OpenAI updated its desktop ChatGPT app to #encrypt the #locally stored records.« theverge.com/2024/7/3/24191636 #tech #media

2024-06-29

Unpatchable in breaks

Apple has so far chosen not to implement protection against the , likely because the performance hit wouldn’t be justified by the very low real of a real-world attack.

So far, no workaround has been implemented.

The long-term solution will be for Apple to address the in the implementation in the design of future chips.

9to5mac.com/2024/03/22/unpatch

🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2024-05-22

Critical GitHub Enterprise Server Flaw Allows Authentication Bypass

Date: May 21, 2024

CVE: [[CVE-2024-4985]]

Vulnerability Type: Improper Authentication

CWE: [[CWE-287]]

Sources: Cyber Security News, SecurityWeek, The Hacker News

Issue Summary

A critical vulnerability in GitHub Enterprise Server, identified as CVE-2024-4985, was discovered that allows attackers to bypass authentication. This flaw, found in versions 3.9.14, 3.10.11, 3.11.9, and 3.12.3, permits unauthorized access to repositories and sensitive data by exploiting a weakness in the SAML SSO authentication process.

Technical Key Findings

The vulnerability arises from a logic error in the SAML SSO authentication process, where the server fails to verify the validity of digital signatures on SAML responses properly. Attackers can craft SAML assertions with any certificate, which the server incorrectly accepts, allowing the spoofing of user identities, including admin accounts.

Vulnerable Products

  • GitHub Enterprise Server versions 3.9.14
  • GitHub Enterprise Server versions 3.10.11
  • GitHub Enterprise Server versions 3.11.9
  • GitHub Enterprise Server versions 3.12.3

Impact Assessment

Exploitation of this vulnerability could lead to unauthorized access to private repositories, sensitive data, and administrative controls. This can result in data breaches, code tampering, and potential intellectual property theft.

Patches or Workaround

GitHub has released patched versions (3.9.15, 3.10.12, 3.11.10, and 3.12.4) to address this issue. As an interim measure, enabling SAML certificate pinning can mitigate the risk. Additionally, auditing access logs for suspicious activity and rotating credentials is advised.

Tags

#GitHub #CVE20244985 #SAML #AuthenticationBypass #SecurityFlaw #EnterpriseSecurity #DataBreach #PatchUpdate #CyberSecurity

Benjamin Carr, Ph.D. 👨🏻‍💻🧬BenjaminHCCarr@hachyderm.io
2024-02-29

#Anycubic users say their #3Dprinters were hacked to warn of a #securityflaw
This #vulnerability allegedly enables potential attackers to control any Anycubic #3Dprinter affected by this vulnerability using the company's #MQTT service #API.
The hacked_machine_readme.gcode file received by the impacted devices also asks Anycubic to open-source their 3D printers because the company's software "is lacking." The file claims 2,934,635 devices downloaded this warning .
techcrunch.com/2024/02/28/anyc

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst