Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Critical Judge0 Vulnerabilities Unveiled

April 29, 2024
Reading Time: 3 mins read
in Alerts
Critical Judge0 Vulnerabilities Unveiled

Tanto Security has recently disclosed critical vulnerabilities in the open-source service Judge0, which is extensively utilized by various organizations for securely executing sandboxed code. These vulnerabilities, identified as CVE-2024-29021, CVE-2024-28185, and CVE-2024-28189, enable a potential sandbox escape and root access to the host machine, posing a substantial security threat. The service is particularly popular among educational institutions and talent recruitment companies for its ability to safely run arbitrary code. According to the Judge0 website, the platform has 23 clients and over 300 self-hosted instances, along with presumed widespread use in private internal networks.

The discovery and analysis of these vulnerabilities were detailed in a blog post by Tanto Security. The vulnerabilities came to light following a casual conversation about Judge0’s security between a researcher and a friend using the platform. This discussion piqued the researcher’s interest, leading to a deeper investigation into Judge0’s mechanisms and security configurations. It was found that certain oversights in the service’s default setup, such as a generic default password for the Judge0 configuration file, made these vulnerabilities exploitable.

The researcher demonstrated how an attacker could potentially leverage these flaws by submitting multiple entries designed to brute force the default password. This approach could allow attackers to queue up submissions and modify the run arguments of a submission via an SQL query, ultimately enabling a sandbox escape and gaining root access. This kind of vulnerability is particularly dangerous as it allows the execution of arbitrary code with the highest level of privileges on the host machine.

In response to the disclosure, there has been a swift call to action within the cybersecurity community, urging immediate measures to patch the disclosed vulnerabilities and secure all Judge0 instances. Organizations using Judge0 are strongly advised to review and update their configurations, change default passwords, and apply any available security updates to mitigate the risks posed by these vulnerabilities. This event underscores the importance of maintaining rigorous security practices, even in environments that are presumed secure, to protect sensitive data and prevent potential exploitation.

Reference:
  • Critical Flaws in Judge0 May Grant Attackers Root Access

Tags: April 2024Cyber AlertCyber Alerts 2024Cyber RiskCyber threatJudge0Tanto Security
ADVERTISEMENT

Related Posts

New Godfather Trojan Hijacks Banking Apps

Winos 4.0 Malware Hits Taiwan Via Tax Phish

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Godfather Trojan Hijacks Banking Apps

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

June 20, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Minecraft Mods On GitHub Spread Malware

June 19, 2025
Russian Phishing Scam Bypasses Google 2FA

Russian Phishing Scam Bypasses Google 2FA

June 19, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Invoices Deliver Sorillus RAT In Europe

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial