• @[email protected]
    link
    fedilink
    281 year ago

    This advisory will be edited with more details on 2024/02/15, when admins have been given some time to update, as we think any amount of detail would make it very easy to come up with an exploit.

    But the commit to fix insufficient origin validation is already visible right there in the repo?

    • losttourist
      link
      fedilink
      301 year ago

      Without a published POC there’s a slightly longer window before clueless script kiddies start having a go at exploiting the vulnerability, though.

            • @[email protected]
              link
              fedilink
              21 year ago

              private repo they commit to and build from

              This isn’t possible with Ruby and Mastodon. The only way to distribute the patch is to reveal the changes to the source. FWIW, compiling the fix is still just an obfuscation method, one can still just diff the binaries and see what changed (see: reverse-engineering Windows vulnerabilities in updates).

              At best, you can release it with a bunch of unrelated and obfuscating changes, but putting work into doing that is further delaying simply getting the fix released.