Comment on 700+ self-hosted Git instances battered in 0-day attacks

bort@sopuli.xyz ⁨3⁩ ⁨days⁩ ago

Here are the steps:

  • The attacker creates a standard Git repository.
  • They commit a single symbolic link pointing to a sensitive target.
  • Using the PutContents API, they write data to the symlink. The system follows the link and overwrites the target file outside the repository.
  • By overwriting .git/config (specifically the sshCommand), the attacker can force the system to execute arbitrary commands–

amazing.

source
Sort:hotnewtop