minus-squarebort@sopuli.xyztoSelfhosted@lemmy.world•700+ self-hosted Git instances battered in 0-day attacks with no fix imminentlinkfedilinkEnglisharrow-up111·3 days ago Here are the steps: The attacker creates a standard Git repository. They commit a single symbolic link pointing to a sensitive target. Using the PutContents API, they write data to the symlink. The system follows the link and overwrites the target file outside the repository. By overwriting .git/config (specifically the sshCommand), the attacker can force the system to execute arbitrary commands– amazing. linkfedilink
minus-squarebort@sopuli.xyztoSelfhosted@lemmy.world•700+ self-hosted Git instances battered in 0-day attacks with no fix imminentlinkfedilinkEnglisharrow-up1·3 days agodeleted by creator linkfedilink
minus-squarebort@sopuli.xyztoOpen Source@lemmy.ml•Discover Hidden Gems: Open-Source Software You Should Know Aboutlinkfedilinkarrow-up5·4 months agolinux fork (not production ready yet) https://github.com/BrycensRanch/SnapX linkfedilink
amazing.