191
submitted 10 months ago by cypherpunks@lemmy.ml to c/fediverse@lemmy.ml
all 20 comments
sorted by: hot top controversial new old
[-] redcalcium@lemmy.institute 29 points 10 months ago

This advisory will be edited with more details on 2024/02/15, when admins have been given some time to update, as we think any amount of detail would make it very easy to come up with an exploit.

But the commit to fix insufficient origin validation is already visible right there in the repo?

[-] losttourist@kbin.social 31 points 10 months ago

Without a published POC there's a slightly longer window before clueless script kiddies start having a go at exploiting the vulnerability, though.

[-] fartsparkles@sh.itjust.works 6 points 10 months ago

Script kiddies aren’t the first ones to take advantage of vulns, threat actors are.

[-] jmcs@discuss.tchncs.de 8 points 10 months ago

That doesn't mean you shouldn't try to contain the blast radius.

[-] pelespirit@sh.itjust.works 3 points 10 months ago

Could you explain what you're saying in common language?

[-] cypherpunks@lemmy.ml 23 points 10 months ago* (last edited 10 months ago)

The lack of details in the advisory is only a minor impediment for a malicious person who wants to figure out how to implement their own exploit for this vulnerability. Anyone can read the patch that fixes it and figure it out.

TLDR: if you run your own instance, update it ASAP. If an instance you rely on hasn't updated yet, consider asking its admins to do so. And if they don't update it soon, you might want to reconsider your choice of instance.

[-] elvith@feddit.de 7 points 10 months ago

And if they don't update it soon, you might want to reconsider your choice of instance.

The advisory went up about 4h ago. About 3h ago, my instance admin sent out an announcement that the patch had been applied. That was before I even heard about the issue.

Nice work :)

[-] AngieStone@mastodon.social 6 points 10 months ago
[-] androidul@lemmy.ml 1 points 10 months ago
[-] desmosthenes@lemmy.world 5 points 10 months ago

hope for the best; plan for the worst

[-] steter@mastodon.stevesworld.co 3 points 10 months ago

@cypherpunks Upgrading went smoothly.

[-] Atelopus-zeteki@kbin.run -5 points 10 months ago

Hmm, so if one is on iOS, the current version 2023.16, and is vulnerable. Take note apple / mac folx.

[-] cypherpunks@lemmy.ml 20 points 10 months ago

No, this is a server-side vulnerability. Clients do not need to update, instances do.

this post was submitted on 01 Feb 2024
191 points (99.5% liked)

Fediverse

17799 readers
6 users here now

A community dedicated to fediverse news and discussion.

Fediverse is a portmanteau of "federation" and "universe".

Getting started on Fediverse;

founded 5 years ago
MODERATORS