writing.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
A small, intentional community for poets, authors, and every kind of writer.

Administered by:

Server stats:

346
active users

#vulnerability

14 posts11 participants1 post today
Replied in thread

@zak @zenbrowser : a still unfixed vulnerability: if NOT using Touch ID, on some websites you may be able to sign in using a passkey WITHOUT authenticating locally - using biometrics or your passcode (screen unlock code).

⛓️💥 This vulnerability also exists WITH Touch ID set up, provided that "Password Autofill" is disabled.

BTW this vulnerability also permits access to:
icloud.com
account.apple.com
(When asked to provide your fingerprint, tap the X at the top right and tap in the "Email" field one more time).

This is a HUGE risk for people who do not want to use biometrics: if a thief grabs their iPhone when unlocked, or watches them enter their passcode and later steals their iPhone, the thief can use ALL of the owner's passwords and some of their passkeys stored in the "Passwords" app (formerly known as iCloud Keychain).

🎬 This increases the risks of theft as shown by WSJ's Joanna Stern in youtube.com/watch?v=QUYODQB_2wQ.

👶 In addition, a (grand) child or anyone else who (shortly) borrows your iPhone/iPad may have access to more of your cloud-accounts than you're aware of.

🔧 Workaround if you don't want to use biometrics to unlock your iPhone/iPad (this does not fix any problem if a thief learns (or successfully guesses) your passcode (screen unlock PIN or password):

• Set up a Touch ID anyway, for example for your left pinky finger (if you're righthanded)

• Disable "iPhone Unlock" in "Touch ID and Passcode" (visible in the first screenshot).

• Use a safer password manager (such as KeePassium) than the Apple "Passwords" app (iCloud KeyChain).

🚨 In any case:

• Make sure that "Password Autofill" (in settings -> "Touch ID and Passcode") is set to ENABLED;

• When you enter your passcode in a public place (such as a bar, bus or train), make very sure that nobody gets to see you enter it.

Replied in thread

When gathered around a fire at dusk, the crackling flames mirror the warmth in our hearts. Shadows play across bare skin, & stories flow like the embers that rise to meet the stars. There is #peace in this #vulnerability, in knowing that our #nakedness is not a spectacle but a testament to #truth. Clothed in nothing but acceptance, we share laughter & silence alike, bound by our shared humanity. The firelight becomes our garment, flickering against the night. (8/12)

I find this vulnerability hilarious

« The GDPR Cookie Compliance – Cookie Banner, Cookie Consent, Cookie Notice – CCPA, DSGVO, RGPD plugin for WordPress is vulnerable to Stored Cross-Site Scripting »

Often, websites only use cookies necessary for normal operation and don’t require explicit user consent. However, some legal teams insist on having it “to be on the safe side.” Now it’s very safe indeed. ;-)

This particular vulnerability isn’t a big deal since it requires admin rights on WordPress to inject. If you’re already an admin, you can do worse things. The only advantage for attackers is that the injection spreads everywhere.

#infosec #gdpr #cybersecurity #vulnerability #wordpress

🔗 vulnerability.circl.lu/vuln/CV

vulnerability.circl.lucvelistv5 - CVE-2025-2205Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.

Yikes, from an article that contains a lot more detail, but just to get your attention as to the impact part:

«The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains undocumented commands that could be leveraged for attacks.

The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence.

"Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls."

The researchers warned that ESP32 is one of the world's most widely used chips for Wi-Fi + Bluetooth connectivity in IoT (Internet of Things) devices, so the risk is significant.»

People worried about this topic might also "enjoy" the recent Netflix series Zero Day.

And not to get too far afield, but hopefully it also didn't escape notice that there have been broad firings of qualified people in the US government for reasons related not to their technical skill or ability to protect our nation from issues like this, but because of irrelevant details of their private lives or personal leanings on issues of having fair and competent government, helping the needy, defending individual human freedom and dignity, or avoiding mass death in myriad ever-more-likely ways.

bleepingcomputer.com/news/secu

BleepingComputer · Undocumented commands found in Bluetooth chip used by a billion devicesBy Bill Toulas

A newly discovered security vulnerability in the Vim text editor, identified as CVE-2025-27423, poses a serious risk for users. This flaw, found in Vim’s (tar.vim plugin), could allow attackers to gain control of a user’s computer if a malicious TAR file is opened.

Vim’s tar.vim plugin is designed to help users view and edit TAR files (a type of compressed archive) directly in the text editor. Unfortunately, a recent update introduced an issue where filenames within these TAR files were not adequately checked or "sanitized." Cybercriminals can exploit this by crafting a specially designed TAR file to execute harmful commands on a victim's computer once the file is opened in Vim.

github.com/vim/vim/security/ad

potential code execution with tar.vim and special crafted tar files
===================================================================
Date: 02.03.2025
Severity: High
CVE: CVE-2025-27423
CWE:...
GitHubpotential code execution with tar.vim and special crafted tar filespotential code execution with tar.vim and special crafted tar files =================================================================== Date: 02.03.2025 Severity: High CVE: CVE-2025-27423 CWE:...

An interesting and disturbing perspective on using AI for core generation.

The concerns:
More code.
Less code re-use.
More software engineer cycles spent debugging AI code.
More security team cycles spent identifying vulnerabilities.

leaddev.com/software-quality/h

LeadDev · How AI generated code accelerates technical debtGitClear’s latest report exposes rising code duplication and declining quality as AI coding tools gain in popularity.
#ai#software#code