minus-squarebort@sopuli.xyztoSelfhosted@lemmy.world•700+ self-hosted Git instances battered in 0-day attacks with no fix imminentlinkfedilinkEnglisharrow-up94·1 day ago Here are the steps: The attacker creates a standard Git repository. They commit a single symbolic link pointing to a sensitive target. Using the PutContents API, they write data to the symlink. The system follows the link and overwrites the target file outside the repository. By overwriting .git/config (specifically the sshCommand), the attacker can force the system to execute arbitrary commands– amazing. linkfedilink
minus-squarebort@sopuli.xyztoSelfhosted@lemmy.world•700+ self-hosted Git instances battered in 0-day attacks with no fix imminentlinkfedilinkEnglisharrow-up1·1 day agodeleted by creator linkfedilink
amazing.