A security vulnerability (CVE-2024-52308) in the GitHub Command Line Interface (CLI) could allow remote code execution on users’ devices. With a CVSS score of 8.1, this highlights the need for developers to stay vigilant with software updates and security measures.
The vulnerability arises from how the gh CLI handles SSH connection details with GitHub Codespaces, which uses SSH for secure communication between the local machine and the remote environment.
By infosecbulletin
/ Sunday , December 1 2024
A workshop on "DDoS use cases & solutions for government & BFSI" held at Bangladesh computer society premises on Saturday...
Read More
By infosecbulletin
/ Saturday , November 30 2024
Uganda’s finance ministry confirmed media reports that hackers breached the central bank’s systems and stole money, but refuted the claims...
Read More
By infosecbulletin
/ Friday , November 29 2024
CERT Germany and Zyxel have alerted about a serious vulnerability in Zyxel firewalls, identified as CVE-2024-11667. This flaw is being...
Read More
By infosecbulletin
/ Friday , November 29 2024
Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
By infosecbulletin
/ Thursday , November 28 2024
CERT-In has flagged a security vulnerability in Oracle’s Agile Product Lifecycle Management (PLM) software, identified as CVE-2024-21287 and cataloged as...
Read More
By infosecbulletin
/ Thursday , November 28 2024
On November 26th, Microsoft patched four vulnerabilities detected in Dynamics 365 Sales, the Partner.Microsoft.Com portal, Microsoft Copilot Studio and Azure...
Read More
By infosecbulletin
/ Thursday , November 28 2024
SL Data Services/Propertyrec, an information research provider exposes a non-password-protected database containing more than 600K records according to the security...
Read More
By infosecbulletin
/ Wednesday , November 27 2024
Cloudflare suffered an incident roughly 3.5 hours On November 14, 2024 impacting the majority of customers using Cloudflare Logs. Cloudflare...
Read More
By infosecbulletin
/ Wednesday , November 27 2024
VMware revealed several critical vulnerabilities in its Aria Operations product, with the most severe allowing attackers to gain root user...
Read More
By infosecbulletin
/ Wednesday , November 27 2024
On Monday, Indian HDFC life insurance said, They got some instances of data leaks. "We have received communication from an...
Read More
According to GitHub’s security advisory, “This exploit occurs when a malicious third-party devcontainer contains a modified SSH server that injects ssh arguments within the SSH connection details. gh codespace ssh and gh codespace logs commands could execute arbitrary code on the user’s workstation if the remote username contains something like -oProxyCommand=”echo hacked” #.“
If a user connects to a compromised Codespace, the malicious SSH server has the capability to manipulate connection details and inject arbitrary commands. This could result in those commands being executed on the user’s machine, which may lead to severe consequences such as data breaches, system compromises, or even escalated malicious activities.
A successful exploit allows remote code execution (RCE) on a victim’s workstation, which can compromise the system, expose sensitive data, and lead to further attacks.According to GitHub, “Successful exploitation could lead to arbitrary code execution on the user’s workstation, potentially compromising the user’s data and system.”
GitHub has quickly fixed this vulnerability by releasing gh CLI version 2.62.0. Please upgrade to this version immediately.
Furthermore, GitHub advises developers to exercise caution when utilizing custom devcontainer images. “Prefer default or pre-built devcontainers from trusted sources,” the advisory recommends, emphasizing the importance of secure development practices.
Hacker offers “Popular Life Insurance” 36 GB of stolen data for sale