Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    ZDI-26-184: Microsoft Windows NDIS Driver Use-After-Free Local Privilege Escalation Vulnerability

    April 29, 2026

    Official SAP npm packages compromised to steal credentials

    April 29, 2026

    ZDI-26-183: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability

    April 29, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining
    News

    Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining

    adminBy adminApril 29, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining

    Hackers are exploiting two authentication bypass vulnerabilities in the Qinglong open-source task scheduling tool to deploy cryptominers on developers’ servers.

    Exploitation started in early February, before the security issues were disclosed publicly at the end of the month, according to researchers at cloud-native application security company Snyk.

    Qinglong is a self-hosted open-source time management platform popular among Chinese developers. It has been forked more than 3,200 times and has over 19,000 stars on GitHub.

    image

    The two security problems impact Qinglong versions 2.20.1 and older and can be chained to achieve remote code execution:

    • CVE-2026-3965: A misconfigured rewrite rule maps ‘/open/*’ requests to ‘/api/*’, unintentionally exposing protected admin endpoints through an unauthenticated path
    • CVE-2026-4047: The authentication check treats paths as case-sensitive (/api/), while the router matches them case-insensitively, allowing requests like ‘/aPi/…’ to bypass authentication and reach protected endpoints.

    The root cause in both flaws is a mismatch between middleware authorization logic and Express.js routing behavior.

    “Both vulnerabilities stem from a mismatch between the security middleware’s assumptions and the framework’s behavior,” Snyk researchers explain.

    “The auth layer assumed certain URL patterns would always be handled one way, while Express.js treated them differently.”

    Snyk reports that attackers have been targeting these two flaws on publicly exposed Qinglong panels to deploy cryptominers since February 7.

    This activity was first spotted by Qinglong users, who reported about a rogue hidden process named ‘.fullgc’ utilizing between 85% and 100% of their CPU power.

    The name deliberately mimics “Full GC,” an innocuous but resource-intensive process, to evade detection.

    According to Snyk, the attackers exploited the flaws to modify Qinglong’s config.sh and injected shell commands that downloaded a miner to ‘/ql/data/db/.fullgc,’ and executed it in the background.

    The remote resource located at ‘file.551911.xyz’ hosted multiple variants of the binary, including for Linux x86_64, ARM64, and macOS.

    The attacks continued with multiple confirmed infections across various setups, including behind Nginx and SSL, while the Qinglong maintainers only responded to the situation on March 1.

    The maintainer acknowledged the vulnerability and urged users to install the latest update. However, the mitigation in pull release #2924 focused on blocking command injection patterns, which Snyk says was insufficient.

    The researchers report that the effective fix came in PR #2941, which corrected the authentication bypass in the middleware.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticlecPanel security advisory (AV26-404) – Canadian Centre for Cyber Security
    Next Article Microsoft Edge security advisory (AV26-396)
    admin
    • Website

    Related Posts

    News

    Official SAP npm packages compromised to steal credentials

    April 29, 2026
    News

    Weaponized Vulnerabilities Deserve a Seat at The Prioritization Table | Blog

    April 29, 2026
    News

    VulnCheck Initial Access Intelligence Update – August 2024 | Blog

    April 29, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    ZDI-26-184: Microsoft Windows NDIS Driver Use-After-Free Local Privilege Escalation Vulnerability

    April 29, 2026

    Official SAP npm packages compromised to steal credentials

    April 29, 2026

    ZDI-26-183: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability

    April 29, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.