Critical Termix Auth Bypass Exposes SSH Keys
A critical authentication bypass vulnerability has been found in the official Termix Docker image. The flaw allows unauthenticated attackers to access an internal API endpoint and retrieve sensitive SSH credentials, including host addresses, usernames, and passwords. This issue is caused by a misconfiguration in the Nginx reverse proxy, which makes the application treat all incoming requests as local. Attackers can easily exploit this by sending a simple GET request to the vulnerable endpoint on any exposed Termix instance. Users are urged to upgrade to the patched version immediately and rotate any potentially exposed SSH credentials.
Latest mentioned: 10-02
Earliest mentioned: 10-02