Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Wiz got RCE on the cloud version of Github.com and access to every customer environment.

Wiz got RCE on the cloud version of Github.com and access to every customer environment.

Scheduled Pinned Locked Moved Uncategorized
14 Posts 13 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

    Almost every time a SaaS supplier tells you a CVE in their product doesn't apply to their SaaS version.. it means they patched it before issuing the CVE.

    S This user is from outside of this forum
    S This user is from outside of this forum
    systemadminihater@cyberplace.social
    wrote last edited by
    #3

    @GossiTheDog You're describing the Microsoft method

    1 Reply Last reply
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      Wiz got RCE on the cloud version of Github.com and access to every customer environment.

      To do this they just reversed the on prem version and found a simple vuln.

      X Cancelled | Verifying your request

      favicon

      (xcancel.com)

      Link Preview Image
      xavier@infosec.exchangeX This user is from outside of this forum
      xavier@infosec.exchangeX This user is from outside of this forum
      xavier@infosec.exchange
      wrote last edited by
      #4

      @GossiTheDog Here's a non-Twitter link: https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854

      1 Reply Last reply
      0
      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

        Almost every time a SaaS supplier tells you a CVE in their product doesn't apply to their SaaS version.. it means they patched it before issuing the CVE.

        drwho@masto.hackers.townD This user is from outside of this forum
        drwho@masto.hackers.townD This user is from outside of this forum
        drwho@masto.hackers.town
        wrote last edited by
        #5

        @GossiTheDog Can I quote you on that?

        1 Reply Last reply
        0
        • R relay@relay.infosec.exchange shared this topic
        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

          Wiz got RCE on the cloud version of Github.com and access to every customer environment.

          To do this they just reversed the on prem version and found a simple vuln.

          X Cancelled | Verifying your request

          favicon

          (xcancel.com)

          Link Preview Image
          henryk@chaos.socialH This user is from outside of this forum
          henryk@chaos.socialH This user is from outside of this forum
          henryk@chaos.social
          wrote last edited by
          #6

          @GossiTheDog A header injection? In *this* economy?!

          stsp@bsd.networkS 1 Reply Last reply
          0
          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

            Almost every time a SaaS supplier tells you a CVE in their product doesn't apply to their SaaS version.. it means they patched it before issuing the CVE.

            laurento@fosstodon.orgL This user is from outside of this forum
            laurento@fosstodon.orgL This user is from outside of this forum
            laurento@fosstodon.org
            wrote last edited by
            #7

            @GossiTheDog Totally 🙂

            1 Reply Last reply
            0
            • henryk@chaos.socialH henryk@chaos.social

              @GossiTheDog A header injection? In *this* economy?!

              stsp@bsd.networkS This user is from outside of this forum
              stsp@bsd.networkS This user is from outside of this forum
              stsp@bsd.network
              wrote last edited by
              #8

              @henryk @GossiTheDog I was hoping for an exciting eyploit and was left rather disappointed ​

              1 Reply Last reply
              0
              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                Wiz got RCE on the cloud version of Github.com and access to every customer environment.

                To do this they just reversed the on prem version and found a simple vuln.

                X Cancelled | Verifying your request

                favicon

                (xcancel.com)

                Link Preview Image
                C This user is from outside of this forum
                C This user is from outside of this forum
                clickymcticker@hachyderm.io
                wrote last edited by
                #9

                @GossiTheDog Oh, phew. I thought this was an RCE impacting Wiz lightbulbs.

                1 Reply Last reply
                0
                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                  Almost every time a SaaS supplier tells you a CVE in their product doesn't apply to their SaaS version.. it means they patched it before issuing the CVE.

                  spaceinvader@social.securitytheater.netS This user is from outside of this forum
                  spaceinvader@social.securitytheater.netS This user is from outside of this forum
                  spaceinvader@social.securitytheater.net
                  wrote last edited by
                  #10

                  @GossiTheDog at least while I’m in charge of issuing CVEs, we won’t do this.

                  1 Reply Last reply
                  0
                  • ketumbra@infosec.exchangeK This user is from outside of this forum
                    ketumbra@infosec.exchangeK This user is from outside of this forum
                    ketumbra@infosec.exchange
                    wrote last edited by
                    #11

                    @xconde @GossiTheDog as long as they also check for abuse of the exploit and Inform you about it. Which would be handy to have a cve number attached to the report.
                    So, they should still fix and then notify but can't just say "cloud is not affected" if they mean, "cloud is no longer vulnerable"

                    1 Reply Last reply
                    0
                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                      Almost every time a SaaS supplier tells you a CVE in their product doesn't apply to their SaaS version.. it means they patched it before issuing the CVE.

                      peterupfold@fosstodon.orgP This user is from outside of this forum
                      peterupfold@fosstodon.orgP This user is from outside of this forum
                      peterupfold@fosstodon.org
                      wrote last edited by
                      #12

                      @GossiTheDog It’s a very Bill Clinton “depends on the meaning of the word ‘is’” approach to truth.

                      1 Reply Last reply
                      0
                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                        Almost every time a SaaS supplier tells you a CVE in their product doesn't apply to their SaaS version.. it means they patched it before issuing the CVE.

                        omegapolice@hachyderm.ioO This user is from outside of this forum
                        omegapolice@hachyderm.ioO This user is from outside of this forum
                        omegapolice@hachyderm.io
                        wrote last edited by
                        #13

                        @GossiTheDog They explicitly say so in their blog post, so ... ?

                        1 Reply Last reply
                        0
                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                          Wiz got RCE on the cloud version of Github.com and access to every customer environment.

                          To do this they just reversed the on prem version and found a simple vuln.

                          X Cancelled | Verifying your request

                          favicon

                          (xcancel.com)

                          Link Preview Image
                          stemeerkat@cyberplace.socialS This user is from outside of this forum
                          stemeerkat@cyberplace.socialS This user is from outside of this forum
                          stemeerkat@cyberplace.social
                          wrote last edited by
                          #14

                          @GossiTheDog this is massive, have Github made a public response?

                          1 Reply Last reply
                          0
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups