Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内。首先,我需要仔细阅读文章,抓住关键点。文章主要讲的是Marimo这个开源Python笔记本的一个严重安全漏洞被迅速利用的情况。 首先,漏洞的编号是CVE-2026-39987,CVSS评分9.3,属于高危。影响所有0.20.4及以下版本。问题出在终端WebSocket端点/terminal/ws没有身份验证,导致攻击者可以执行任意系统命令。 然后,Sysdig发现漏洞披露后不到10小时就被利用了,攻击者甚至没有PoC代码就成功窃取了凭证。这说明威胁行为者非常关注漏洞披露,并迅速行动。 最后,作者提醒开发者和企业要重视安全漏洞的修复,不能因为应用不知名就忽视保护。 现在我要把这些要点浓缩到100字以内。需要包括漏洞名称、影响范围、攻击方式、披露后的快速利用情况以及对开发者的警示。 </think> Marimo开源Python笔记本发现高危漏洞CVE-2026-39987(CVSS 9.3),允许未认证攻击者通过WebSocket端点获取完整PTY shell并执行系统命令。漏洞披露后10小时内即被利用,攻击者无需PoC代码即可窃取凭证。此事件凸显威胁行为者迅速响应新披露漏洞的能力,提醒开发者及时修复漏洞以应对潜在威胁。 2026-4-10 07:37:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Vulnerability / Threat Intelligence

A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig.

The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution vulnerability impacting all versions of Marimo prior to and including 0.20.4. The issue has been addressed in version 0.23.0.

"The terminal WebSocket endpoint /terminal/ws lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands," Marimo maintainers said in an advisory earlier this week.

"Unlike other WebSocket endpoints (e.g., /ws) that correctly call validate_auth() for authentication, the /terminal/ws endpoint only checks the running mode and platform support before accepting connections, completely skipping authentication verification."

In other words, attackers can obtain a full interactive shell on any exposed Marimo instance through a single WebSocket connection without requiring any credentials.

Sysdig said it observed the first exploitation attempt targeting the vulnerability within 9 hours and 41 minutes of it being publicly disclosed, with a credential theft operation executed in minutes, despite there being no proof-of-concept (PoC) code available at the time.

The unknown threat actor behind the activity is said to have connected to the /terminal/ws WebSocket endpoint on a honeypot system and initiated manual reconnaissance to explore the file system and, minutes later, systematically attempted to harvest data from the .env file, as well as search for SSH keys and read various files.

The attacker returned to the honeypot an hour later to access the contents of the .env file and check if other threat actors were active during the time window. No other payloads, like cryptocurrency miners or backdoors, were installed.

"The attacker built a working exploit directly from the advisory description, connected to the unauthenticated terminal endpoint, and began manually exploring the compromised environment," the cloud security company said. "The attacker connected four times over 90 minutes, with pauses between sessions. This is consistent with a human operator working through a list of targets, returning to confirm findings."

The speed at which newly disclosed flaws are being weaponized indicates that threat actors are closely keeping an eye on vulnerability disclosures and quickly exploiting them during the time between disclosure and patch adoption.This, in turn, has shrunk the time defenders must respond once a vulnerability is publicly announced.

"The assumption that attackers only target widely deployed platforms is wrong. Any internet-facing application with a critical advisory is a target, regardless of its popularity."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html
如有侵权请联系:admin#unsafe.sh