DevSec Selection #28 – Auth Bypass in Next.js, IngressNightmare K8s RCE, TRAIL Threat Modeling

April 6, 2025

Intro

Hi everyone!

I hope you had a great weekend. This edition starts with IngressNightmare — a series of vulnerabilities that may lead to unauthenticated remote code execution in Kubernetes. The linked article thoroughly presents the exploitation process and requirements to perform an effective attack. If you work with Next.js, you will be also interested in the recently fixed authorization bypass vulnerability.

Taking into account the recent, widely discussed attack against the open-source “tj-actions/changed-files” GitHub Action, I recommend taking a look at “Whose code am I running in GitHub Actions?” — an article that illustrates the necessity of using immutable references to safeguard GitHub workflows.

For developers and security professionals working with the SDLC, it’s worth checking out how threat modeling is performed by Trail of Bits.

Last but not least, a pentester and content creator named PinkDraconian created a great walkthrough video presenting the exploitation process of Damn Vulnerable RESTaurant.

Enjoy the materials and stay secure!

Materials

What you need to know about the recently discovered Next.js CVE 2025-29927 vulnerability? This article provides an in-depth technical analysis of the authorization bypass flaw, its affected versions, exploitation example and recommended mitigation. Best for web developers and security professionals working with Next.js.

This article discusses “IngressNightmare” – a series of severe unauthenticated remote code execution vulnerabilities that could lead to compromise a number of cloud environments. Aimed at DevOps, Kubernetes specialists and security teams. It offers insights on the vulnerabilities, their implications and recommended mitigation.

You may already know Damn Vulnerable RESTaurant project which is a training playground for security enthusiasts willing to learn API security. Now, pentester and content creator named PinkDraconian created a great walkthrough video presenting the exploitation process of the app. It took him ~20minutes to obtain root user starting from unauthenticated perspective. If you didn’t play with that yet, I highly recommend to take a look at the video. It presents the shortest exploitation path but you can find there much more vulns and other exploitation paths. Have fun!

The article presents a recent security incident involving malicious code in a popular GitHub Action, higlighting the importance of using immutable references, especially to third-party Actions. It provides a shell script for checking the GitHub Actions in your workflows. Suggested for developers, DevOps and AppSec specialists.

Curious about how other companies perform threat modelling to improve application’s security? The Trail of Bits blog introduces the TRAIL threat modeling process, which combines established methodologies to document system risks and design vulnerabilities. This article is valuable for security professionals and developers looking for effective threat modelling implementation throughout the software development lifecycle.

How can open source maintainers effectively handle vulnerability reports? This article guides maintainers through a structured approach to vulnerability disclosure, presenting tools like GitHub’s Private Vulnerability Reporting and draft security advisories. Dedicated for developers involved in open source projects looking to enhance their security practices.

What risks does a minor exposed secret pose in CI/CD processes? This article explores a potential supply chain vulnerability associated with GitHub’s CodeQL due to mistakenly exposed tokens. Targeted at security professionals and DevOps teams, it reveals the implications of token misuse on GitHub Actions workflows and how such vulnerabilities could be exploited.

Are you aware of the recent phishing attacks targeting GitHub repositories? This article presents a widespread campaign that tricked developers into granting malicious OAuth apps access to their accounts. It presents the attack, how to identify it and revoke such access. If you or your colleages use GitHub actively, definitely worth to read.

Interesting Article?

Join DevSec Selection!

DevSec Selection is a bi-weekly Newsletter with the latest outstanding articles related with DevSecOps and application security.


Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments