Normal view
-
/r/netsec - Information Security News & Discussion
- Evaluating AI and ML in Network Security: A Comprehensive Literature Review
-
/r/netsec - Information Security News & Discussion
- Trivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets Attackers
-
/r/netsec - Information Security News & Discussion
- Attack surface analysis of 5,121 MCP servers: 555 have toxic data flows where safe tools combine into dangerous paths
-
/r/netsec - Information Security News & Discussion
- Claude Code workspace trust dialog bypass via repository settings loading order [CVE-2026-33068, CVSS 7.7]. Settings resolved before trust dialog shown.
Claude Code workspace trust dialog bypass via repository settings loading order [CVE-2026-33068, CVSS 7.7]. Settings resolved before trust dialog shown.
CVE-2026-33068 is a configuration loading order defect in Anthropic's Claude Code CLI tool (versions prior to 2.1.53). A malicious `.claude/settings.json` file in a repository can bypass the workspace trust confirmation dialog by exploiting the order in which settings are resolved. The mechanism: Claude Code supports a `bypassPermissions` field in settings files. This is a legitimate, documented feature intended for trusted workspaces. The vulnerability is that repository-level settings ( `.claude/settings.json` ) are loaded and resolved before the workspace trust dialog is presented to the user. A malicious repository can include a settings file with `bypassPermissions` entries, and those permissions are applied before the user has an opportunity to review and approve the workspace. This is CWE-807: Reliance on Untrusted Inputs in a Security Decision. The trust decision (whether to grant elevated permissions) depends on inputs from the entity being evaluated (the repository). The security boundary between "untrusted repository" and "trusted workspace" is bridged by the settings loading order. The fix in Claude Code 2.1.53 changes the loading order so that the trust dialog is presented before repository-level settings are resolved. Worth noting: `bypassPermissions` is not a hidden feature or a misconfiguration. It is documented and useful for legitimate workflows. The bug is purely in the loading order. [link] [comments]
-
/r/netsec - Information Security News & Discussion
- Lookout's LLM-assistance findings in DarkSword iOS exploit kit: a source-by-source breakdown of what each research team actually said
-
/r/netsec - Information Security News & Discussion
- A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746) - watchTowr Labs
-
/r/netsec - Information Security News & Discussion
- 22 security advisories covering AI/ML infrastructure: 40 CVEs, 94 Sigma detection rules (MLflow, vLLM, PyTorch, Flowise, MCP servers, LangGraph, HuggingFace tooling)
22 security advisories covering AI/ML infrastructure: 40 CVEs, 94 Sigma detection rules (MLflow, vLLM, PyTorch, Flowise, MCP servers, LangGraph, HuggingFace tooling)
Compiled over the past few weeks. Covers four streams: Adversarial ML, Agent Security, Supply Chain, and Prompt Injection. Highlights by severity: **CRITICAL (9 advisories)** - ML model scanner universal blocklist bypass -- the scanner HuggingFace Hub relies on for model upload safety can be completely bypassed via stdlib modules. CVSS 10.0. - Flowise 6-vuln cluster (CVE-2026-30820 through CVE-2026-31829) -- missing auth, file upload, IDOR, mass assignment, SSRF. CVSS 9.8. - MLflow auth bypass chained to RCE via artifact path traversal (CVE-2026-2635 + CVE-2026-2033). Default install ships with hardcoded credentials. CVSS 9.8. - vLLM RCE via video processing pipeline (CVE-2026-22778) -- heap overflow to ASLR bypass, unauthenticated. CVSS 9.8. - Agenta LLMOps sandbox escape + SSTI (CVE-2026-27952, CVE-2026-27961). CVSS 9.9. - claude-code-ui triple command injection (CVE-2026-31975, CVE-2026-31862, CVE-2026-31861). CVSS 9.8. **Notable HIGH/MEDIUM** - LangGraph checkpoint unsafe msgpack deserialization (CVE-2026-28277) + Redis query injection (CVE-2026-27022) - PyTorch weights_only unpickler memory corruption (CVE-2026-24747) -- defeats the mitigation everyone recommends - MCP server vulnerabilities across mcp-server-git, mcp-atlassian, WeKnora - First documented in-the-wild indirect prompt injection against production AI agents (Unit 42 research) Each advisory includes full attack chain analysis, MITRE ATLAS mapping where applicable, and Sigma detection rules you can deploy. 94 rules total across the 22 advisories. [link] [comments]
-
/r/netsec - Information Security News & Discussion
- we found a memory exhaustion CVE in a library downloaded 29 million times a month. AWS, DataHub, and Lightning AI are in the blast radius.
we found a memory exhaustion CVE in a library downloaded 29 million times a month. AWS, DataHub, and Lightning AI are in the blast radius.
found this during a routine supply chain audit of our own codebase. the part that concerns us most is the false patch problem - anyone who responded to CVE-2025-58367 last year updated the restricted unpickler and considered that attack surface closed. it wasn't. if you're running the likes of SageMaker, DataHub, or acryl-datahub and haven't pinned to 8.6.2 yet, worth checking now.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- Exploiting a PHP Object Injection in Profile Builder Pro in the era of AI
Exploiting a PHP Object Injection in Profile Builder Pro in the era of AI
How AI helped us in the process of finding an Unauthenticated PHP Object Injection in a WordPress plugin. In this blog post, we discuss how we discovered and exploited the vulnerability using a novel POP chain.
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- A Copy-Paste Bug That Broke PSpiceยฎ AES-256 Encryption
A Copy-Paste Bug That Broke PSpiceยฎ AES-256 Encryption
-
/r/netsec - Information Security News & Discussion
- OpenSIPS SQL Injection to Authentication Bypass (CVE-2026-25554)
OpenSIPS SQL Injection to Authentication Bypass (CVE-2026-25554)
-
/r/netsec - Information Security News & Discussion
- BYOUD - Bring Your Own Unwind Data - By KlezVirus
BYOUD - Bring Your Own Unwind Data - By KlezVirus
-
/r/netsec - Information Security News & Discussion
- A timeline of MCP security breaches: Tool poisoning, RCE via mcp-remote, sandbox escapes, and 7,000+ exposed servers
-
/r/netsec - Information Security News & Discussion
- CVE-2026-22729: JSONPath Injection in Spring AIโs PgVectorStore
CVE-2026-22729: JSONPath Injection in Spring AIโs PgVectorStore
-
/r/netsec - Information Security News & Discussion
- Kanboard Authenticated SQL Injection CVE-2026-33058 Writeup
Kanboard Authenticated SQL Injection CVE-2026-33058 Writeup
-
/r/netsec - Information Security News & Discussion
- CVE-2026-22730: SQL Injection in Spring AIโs MariaDB Vector Store
CVE-2026-22730: SQL Injection in Spring AIโs MariaDB Vector Store
-
/r/netsec - Information Security News & Discussion
- Roundcube Webmail: three more sanitizer bypasses enable email tracking and phishing
-
/r/netsec - Information Security News & Discussion
- From virtio-snd 0-Day to Hypervisor Escape: Exploiting QEMU with an Uncontrolled Heap Overflow
-
/r/netsec - Information Security News & Discussion
- [Tool] I built a CVE visualization tool for fun (VulnPath) -- would love and appreciate any feedback from this community!
[Tool] I built a CVE visualization tool for fun (VulnPath) -- would love and appreciate any feedback from this community!
Not sure if I'm the only one but I've always thought looking up CVEs felt archaic and outdated. I'm also a visual learner so I always wished there was some kind of visual graph that explains the E2E attack chain for me.
So rather than complaining, I built VulnPath as a fun side project. It's a CVE visualization tool where it will not only give you the full CVE data, but also a node graph visualizing the attack chain. I also added a "Simple" toggle for situations where you may need to explain the vulnerability to a less technical audience.
I honestly just want to know if this is something other people would find useful, or if I'm solving a problem that only bothers me. Please feel free to check it out; any feedback/suggestions are welcome (including if you think this is a terrible idea lol).
Note: the webapp isn't really mobile friendly (for now), so apologies in advance!
[link] [comments]
-
/r/netsec - Information Security News & Discussion
- GlassWorm: Part 5 -- xorshift obfuscation, Chrome HMAC bypass, and cryptowallet seed phrase theft
GlassWorm: Part 5 -- xorshift obfuscation, Chrome HMAC bypass, and cryptowallet seed phrase theft
As usual, in-depth sample analysis on linked files
[link] [comments]