TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How Patreon (probably) got hacked – Publicly exposed Werkzeug Debugger

32 点作者 jsnathan超过 9 年前

2 条评论

fransr超过 9 年前
I was pretty divided into publishing this, mostly because I know the people over at Patreon are really doing a great job around security in general and I didn&#x27;t want to bring more gasoline to the fire. (Is that a working proverb?)<p>However, due to the fact that there has been posts around publicly available Werkzeug Debuggers before and also the fact that there are so many still out there, I still decided do to it.<p>Also worth noting that Shodan.io even crawled this host when the instance actually launched the Debugger directly upon visiting it. This made it extremely easy for an attacker to actually exploit this vulnerable endpoint only by visiting the domain. Visit domain -&gt; Werkzeug Debugger -&gt; &quot;[console ready]&quot; -&gt; RCE.
评论 #10321076 未加载
piquadrat超过 9 年前
&gt; Unfortunately there are thousands of publicly available instances of Werkzeug out there and each and every one of them should take proper mitigation actions as if they have already been exploited.<p>This should probably say &quot;publicly available instances of the Werkzeug debugger&quot;. Werkzeug without the debugger is perfectly safe AFAIK.
评论 #10318530 未加载