Skip to content

Weekly Security Updates: IngressNightmare, NextJS, and DNA Leaks

Unauthorized attackers given opportunity to completely take over Kubernetes Ingress NGINX Controller due to uncovered vulnerabilities by Wiz Research this week.

Unauthorized attackers can potentially seize full control over Kubernetes clusters through a chain...
Unauthorized attackers can potentially seize full control over Kubernetes clusters through a chain of vulnerabilities unveiled in the Ingress NGINX Controller by Wiz Research this week.

Weekly Security Updates: IngressNightmare, NextJS, and DNA Leaks

Weekly Tech Wrap-up: Here's a roundup of some recent developments in the tech world, from potential security threats to intriguing discoveries.

Kubernetes Ingress Chaos

Researchers from Wiz Research have exposed a dangerous chain of vulnerabilities in the Kubernetes Ingress NGINX Controller. Dubbed "IngressNightmare," these vulnerabilities could allow unauthorized attackers to take over clusters, posing a significant risk to over 6500 Kubernetes installations on the public internet. The attack chain works by exploiting weak admission control, file system access, and buffer overflows. It's crucial for users to update their systems to the latest versions of the Ingress NGINX Controller (1.12.1 and 1.11.5) to mitigate the threat.

Next.js Stumble

Next.js, another popular project, has encountered a unique vulnerability in its middleware component. When a malicious user spools a crafted HTTP header, the middleware layer can inadvertently pass the request without any processing. The issue is more daunting when the middleware is involved in user authentication, as it could allow unauthorized access. Updates have been made to the latest versions of Next.js (14.x and 15.x) to tackle this issue.

Linux Security Snafu

Google researchers have uncovered a flaw in nftables, widening the path for exploitation by removing the CONFIG_RANDOM_KMALLOC_CACHES hardening technique when used within loadable kernel modules. Although this affects only a small portion of Linux distributions, the impact could be substantial. This issue has been addressed in the Linux 6.15 merge window and will soon be backported to stable kernels.

23andMe: Your DNA for Sale?

23andMe, the popular personal DNA testing service, has filed for Chapter 11 bankruptcy. This development raises valid concerns about the fate of users' genetic data during the sale of the company. Users are urged to log in and request the deletion of their data as per GDPR regulations. The long-term fallout from this bankruptcy remains to be seen.

Appsmith: A Series of Missteps

Rhino Security recently discovered a slew of CVEs in the Appsmith platform. Among the vulnerabilities are a REST-API vulnerability allowing system restarts, an easily brute-forced unique ID for read-only users, and a pseudo-unauthenticated RCE. By default, Appsmith allows users to create new applications and gain access to databases without permission, potentially enabling arbitrary SQL queries and a backdoor for remote code execution.

Oracle Cloud Data Breach?

Unconfirmed rumors of a data breach in Oracle Cloud have been circulating for a week. However, Bleeping Computer has confirmed that legitimate data samples have been leaked, leading many to suspect that a breach may indeed have occurred.

Revisiting BLASTPASS

Google's Project Zero has revisited the BLASTPASS exploit, first seen in 2003, used by the NSO Group against iMessage on iOS devices. This exploit allowed for zero-click exploitation through a Huffman tree decompression vulnerability. Although complex, the work behind this exploit remains impressive.

BlackLock Unveiled

Researchers at Resecurity have cracked the infrastructure of the BlackLock ransomware group, uncovering valuable data such as server logs, email addresses, passwords, and IP address records. Although no arrests have been reported, this promising hack could lead to increased efforts to pursue and prosecute ransomware criminals.

Phishing Ph gradient

In an unusual turn of events, cybersecurity expert Troy Hunt, creator of haveibeenpwned.com, became a victim of a phishing attack. Although the attack resulted only in the loss of his Mailchimp mailing list, it serves as a potent reminder that even seasoned professionals can fall prey to malicious practices. Be ever vigilant!

  1. The potential risk to Linux systems increases due to a flaw discovered in nftables, which removed a hardening technique essential for secure kernel modules (Linux Security Snafu).
  2. In the realm of health-and-wellness, the filing for bankruptcy by 23andMe raises concerns about the future of personal genetic data and compliance with GDPR regulations (23andMe: Your DNA for Sale?).
  3. Researchers from Resecurity have penetrated the infrastructure of the BlackLock ransomware group, unearthing crucial data that may aid in the pursuit and prosecution of cybercriminals (BlackLock Unveiled).

Read also:

    Latest