Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. There's serious panic being caused by AI discovered vulnerabilities behind the scenes, where those finding them are basically using them as marketing.

There's serious panic being caused by AI discovered vulnerabilities behind the scenes, where those finding them are basically using them as marketing.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
27 Indlæg 19 Posters 63 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

    CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

    It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

    The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

    huronbikes@cyberplace.socialH This user is from outside of this forum
    huronbikes@cyberplace.socialH This user is from outside of this forum
    huronbikes@cyberplace.social
    wrote sidst redigeret af
    #18

    @GossiTheDog this particular defect-leading-to-vulnerability according to F5 can be mitigated by using named parameters instead of numbered in the rewrite regex replace expressions.

    I don't think the conditions that expose the issue are too terribly unusual as this is the sort of thing that would be done if one wanted to, say, wrap an older HTTP API with semantics that use path parameters.

    The defect also impacts the NginX Kubernetes Ingress Controller.

    1 Reply Last reply
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

      It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

      The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

      epd5qrxx@mastodon.onlineE This user is from outside of this forum
      epd5qrxx@mastodon.onlineE This user is from outside of this forum
      epd5qrxx@mastodon.online
      wrote sidst redigeret af
      #19

      @GossiTheDog

      > Theoretically, we could leverage this design to leak ASLR by progressively overwriting pointers byte by byte. In this post, we discuss the exploitation technique assuming ASLR has already been bypassed.

      Based on that ASLR is "just" a nuisance and not an actual show stopper 🤔

      https://depthfirst.com/research/nginx-rift-achieving-nginx-rce-via-an-18-year-old-vulnerability

      gossithedog@cyberplace.socialG 1 Reply Last reply
      0
      • epd5qrxx@mastodon.onlineE epd5qrxx@mastodon.online

        @GossiTheDog

        > Theoretically, we could leverage this design to leak ASLR by progressively overwriting pointers byte by byte. In this post, we discuss the exploitation technique assuming ASLR has already been bypassed.

        Based on that ASLR is "just" a nuisance and not an actual show stopper 🤔

        https://depthfirst.com/research/nginx-rift-achieving-nginx-rce-via-an-18-year-old-vulnerability

        gossithedog@cyberplace.socialG This user is from outside of this forum
        gossithedog@cyberplace.socialG This user is from outside of this forum
        gossithedog@cyberplace.social
        wrote sidst redigeret af
        #20

        @ePD5qRxX prove it 🤣

        1 Reply Last reply
        0
        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

          CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

          It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

          The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

          databeestje@noc.socialD This user is from outside of this forum
          databeestje@noc.socialD This user is from outside of this forum
          databeestje@noc.social
          wrote sidst redigeret af
          #21

          @GossiTheDog could this one be related to the Palo Alto captive portal authentication ?

          1 Reply Last reply
          0
          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

            CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

            It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

            The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

            phnt@fluffytail.orgP This user is from outside of this forum
            phnt@fluffytail.orgP This user is from outside of this forum
            phnt@fluffytail.org
            wrote sidst redigeret af
            #22
            @GossiTheDog
            >It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it.
            You can just scan the whole Internet with this. The attacker doesn't need to know the configuration.

            >The PoC they've built specifically disabled ASLR
            Doesn't really matter either. Randomization so far always was just another fence to jump over. It makes exploitation harder, not impossible.
            1 Reply Last reply
            0
            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

              I will likely be one of the first people banging the drum to patch and mitigate if any of the recent AI vulns results in serious harm. Otherwise, keep calm and carry on patching as usual.

              starlily@mastodon.socialS This user is from outside of this forum
              starlily@mastodon.socialS This user is from outside of this forum
              starlily@mastodon.social
              wrote sidst redigeret af
              #23

              @GossiTheDog Copy Fail and Dirty Frag are pretty serious.

              1 Reply Last reply
              0
              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                There's serious panic being caused by AI discovered vulnerabilities behind the scenes, where those finding them are basically using them as marketing. Automated vulnerability hype train again, basically.

                A thread on a few of them.

                sharkfie@infosec.exchangeS This user is from outside of this forum
                sharkfie@infosec.exchangeS This user is from outside of this forum
                sharkfie@infosec.exchange
                wrote sidst redigeret af
                #24

                @GossiTheDog
                Good thread o7
                More bugs found is good but bugs are found and fixed everyday without much spectacle

                1 Reply Last reply
                0
                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                  There's serious panic being caused by AI discovered vulnerabilities behind the scenes, where those finding them are basically using them as marketing. Automated vulnerability hype train again, basically.

                  A thread on a few of them.

                  redsakana@infosec.exchangeR This user is from outside of this forum
                  redsakana@infosec.exchangeR This user is from outside of this forum
                  redsakana@infosec.exchange
                  wrote sidst redigeret af
                  #25

                  @GossiTheDog All this feels like a good demonstration of the statement that AI companies tend to have little in the way of a moat. So you have cookie-cutter LLM-linter startups trying to stand out from the vast ocean of cookie-cutter AI startups by dropping a "0day RCE", no matter how silly, with maximum splash.

                  1 Reply Last reply
                  0
                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                    CVE-2026-42945 - Nginx (otherwise branded Nginx Rift)

                    It relies on a specific Nginx config to be vulnerable, and for attacker to know or discover the config to exploit it. To reach RCE, also ASLR needs to have been disabled on the box.

                    The PoC they've built specifically disabled ASLR, deploys a specifically vulnerable config and the exploit knows about the vulnerable config endpoint.

                    brib@bribstodon.xyzB This user is from outside of this forum
                    brib@bribstodon.xyzB This user is from outside of this forum
                    brib@bribstodon.xyz
                    wrote sidst redigeret af
                    #26

                    @GossiTheDog I spent way too long figuring out how I needed to respond and now I'm annoyed at these vendors.

                    Admittedly I've been annoyed at these vendors for a while, it's one thing to use AI to discover vulns and another thing to use AI to create terrible writeups that are wasting everyone's time (this was an issue with CopyFail too)

                    If every slop receiver could bill the slop sender for the extra time taken trying to parse this stuff I think companies would think a lot harder before sending slop out

                    1 Reply Last reply
                    0
                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                      I will likely be one of the first people banging the drum to patch and mitigate if any of the recent AI vulns results in serious harm. Otherwise, keep calm and carry on patching as usual.

                      gossithedog@cyberplace.socialG This user is from outside of this forum
                      gossithedog@cyberplace.socialG This user is from outside of this forum
                      gossithedog@cyberplace.social
                      wrote sidst redigeret af
                      #27

                      Regarding CVE-2026-42945 in nginx - no modern (or even old) Linux distribution runs nginx without ASLR.

                      The way the PoC exploit works is they spawn nginx like this:

                      > exec setarch x86_64 -R /nginx-src/build/nginx -p /app -c /app/nginx.conf

                      Setarch -R disables ASLR. I've had a look through Github and I can't find any other software which actually does this for nginx either.

                      So, cool, sweet technical vuln - it's valid - but the RCE apocalypse ain't coming.

                      1 Reply Last reply
                      1
                      0
                      • kramse@helvede.netK kramse@helvede.net shared this topic
                      Svar
                      • Svar som emne
                      Login for at svare
                      • Ældste til nyeste
                      • Nyeste til ældste
                      • Most Votes


                      • Log ind

                      • Har du ikke en konto? Tilmeld

                      • Login or register to search.
                      Powered by NodeBB Contributors
                      Graciously hosted by data.coop
                      • First post
                        Last post
                      0
                      • Hjem
                      • Seneste
                      • Etiketter
                      • Populære
                      • Verden
                      • Bruger
                      • Grupper