Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 11/03/21 in all areas

  1. A now-patched critical remote code execution (RCE) vulnerability in GitLab's web interface has been detected as actively exploited in the wild, cybersecurity researchers warn, rendering a large number of internet-facing GitLab instances susceptible to attacks. Tracked as CVE-2021-22205, the issue relates to an improper validation of user-provided images that results in arbitrary code execution. The vulnerability, which affects all versions starting from 11.9, has since been addressed by GitLab on April 14, 2021 in versions 13.8.8, 13.9.6, and 13.10.3. In one of the real-world attacks detailed by HN Security last month, two user accounts with admin privileges were registered on a publicly-accessible GitLab server belonging to an unnamed customer by exploiting the aforementioned flaw to upload a malicious payload "image," leading to remote execution of commands that granted the rogue accounts elevated permissions. Although the flaw was initially deemed to be a case of authenticated RCE and assigned a CVSS score of 9.9, the severity rating was revised to 10.0 on September 21, 2021 owing to the fact that it can be triggered by unauthenticated threat actors as well. "Despite the tiny move in CVSS score, a change from authenticated to unauthenticated has big implications for defenders," cybersecurity firm Rapid7 said in an alert published Monday. Despite the public availability of the patches for more than six months, of the 60,000 internet-facing GitLab installations, only 21% of the instances are said to be fully patched against the issue, with another 50% still vulnerable to RCE attacks. In the light of the unauthenticated nature of this vulnerability, exploitation activity is expected to increase, making it critical that GitLab users update to the latest version as soon as possible. "In addition, ideally, GitLab should not be an internet facing service," the researchers said. "If you need to access your GitLab from the internet, consider placing it behind a VPN." Additional technical analysis related to the vulnerability can be accessed here. Found this article interesting? Follow THN on Facebook, Twitter  and LinkedIn to read more exclusive content we post. Source: https://thehackernews.com/2021/11/alert-hackers-exploiting-gitlab.html
    2 points
  2. Sa-ti dai disable la cont si sa dezinstalezi aplicatia aia de gangsteri, evrei, ciori, lesbiene, gay si manelari!
    2 points
  3. Cateva sugestii: Scoate-ti aplicatiile 3rd party pe care nu le folosesti (s-ar putea una sa incerce sa se logheze pe contul tau) Vezi daca telefonul tau e rootat / jailbreak-uit sa nu ai vreo surpriza de malware Pe aceeasi idee, vezi sa nu ai instalate prostii de aplicatii care fac keylogging sau se uita la alte aplicatii Schimba-ti emailul la cont Daca ai gmail, poti sa-ti pui un punct in adresa de email si tot la tine ajunge, de exemplu daca am adresa de email dragos.popescu@gmail.com, dr.agos.popescu@gmail.com va fi si ea valida si va trimite emailurile catre acelasi inbox Daca ai bagat MFA-ul cu Google Auth, iti sugerez sa treci pe Authy pentru ca datele sunt salvate in cloud si daca pierzi telefonul nu pierzi accesul
    1 point
  4. Salut, mie mi se pare o mare porcarie. Intr-adevar, poate ai sanse mai mari acolo sa gasesti cine stie ce droguri sau alte porcarii, dar in afara de asta nu e util la nimic. Astept si eu niste pareri diferite, poate ma insel. Referitor la "hacking", am gasit doar mizerii de acum 30 de ani parca scrise de copii de 12 ani in pauzele de la CS:GO.
    1 point
This leaderboard is set to Bucharest/GMT+02:00
×
×
  • Create New...