Post AWVx2XSBszaTt4be7s by jernej__s@infosec.exchange
(DIR) More posts by jernej__s@infosec.exchange
(DIR) Post #AWVx2W4P1wxtb0T8PQ by dalias@hachyderm.io
2023-06-09T10:49:50Z
1 likes, 0 repeats
So there's an RCE in acme.sh and a rogue CA abusing it. Because they use eval, of course. 🤦
(DIR) Post #AWVx2Wqc8hWu0X1dYW by muvlon@hachyderm.io
2023-06-09T11:37:04Z
0 likes, 0 repeats
@dalias Come use our ACME client, it's just 1 huge bash file, wow so simple uwu
(DIR) Post #AWVx2XSBszaTt4be7s by jernej__s@infosec.exchange
2023-06-09T11:54:33Z
0 likes, 0 repeats
@muvlon @dalias Looks suspiciously at dehydrated(at least the only instance of eval I see is [[ -z "${@}" ]] && eval set -- "--help").
(DIR) Post #AWVx2Y95JVtm26ftz6 by dalias@hachyderm.io
2023-06-09T12:05:03Z
1 likes, 0 repeats
@jernej__s @muvlon Thread with info here: https://glauca.space/@q/110513256538174560It's going to be hilarious when the RCE bug gets fixed and the rogue CA's broken fake ACME method that only works via RCE stops working.
(DIR) Post #AWVxAeBajuBR5FhzaS by lanodan@queer.hacktivis.me
2023-06-09T12:08:37.119536Z
0 likes, 0 repeats
@dalias Glad I don't run it as root like some people probably do…
(DIR) Post #AWW9fQS92zZiv0tUSO by dalias@hachyderm.io
2023-06-09T14:24:08Z
1 likes, 0 repeats
@astraleureka @jernej__s @muvlon Hopefully due to the "find out" stage of what happens when you fuck around with exploiting RCE bugs in software your customers are running...