bolha.us is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a Brazilian IT Community. We love IT/DevOps/Cloud, but we also love to talk about life, the universe, and more. | Nós somos uma comunidade de TI Brasileira, gostamos de Dev/DevOps/Cloud e mais!

Server stats:

252
active users

#middleware

0 posts0 participants0 posts today
Markus Eisele<p>Red Hat Middleware moving to IBM <a href="http://markclittle.blogspot.com/2025/03/red-hat-middleware-moving-to-ibm.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="ellipsis">markclittle.blogspot.com/2025/</span><span class="invisible">03/red-hat-middleware-moving-to-ibm.html</span></a> by @nmcl<br><a href="https://mastodon.online/tags/redhat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhat</span></a> <a href="https://mastodon.online/tags/ibm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ibm</span></a> <a href="https://mastodon.online/tags/middleware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>middleware</span></a></p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>»Critical Next.js Middleware Vulnerability Allows Attackers to Bypass Authorization:<br>A severe vulnerability has been identified in Next.js, a popular React framework used for building web applications, under the designation CVE-2025-29927.«</p><p>Well, I have to give it up and look at it.</p><p>🧑‍💻 <a href="https://gbhackers.com/critical-next-js-middleware-vulnerability/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/critical-next-js</span><span class="invisible">-middleware-vulnerability/</span></a></p><p><a href="https://chaos.social/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://chaos.social/tags/nextjs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nextjs</span></a> <a href="https://chaos.social/tags/webdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webdev</span></a> <a href="https://chaos.social/tags/react" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>react</span></a> <a href="https://chaos.social/tags/sec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sec</span></a> <a href="https://chaos.social/tags/framework" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>framework</span></a> <a href="https://chaos.social/tags/middleware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>middleware</span></a> <a href="https://chaos.social/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a> <a href="https://chaos.social/tags/itsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsec</span></a></p>
Suzanne Aldrich (she/her)<p>Critical Next.js Middleware Vulnerability (CVE-2025-29927)</p><p>A major auth bypass vulnerability in Next.js middleware (prior to v14.2.25 / v15.2.3) allows attackers to inject the x-middleware-subrequest header and bypass authorization entirely. Exploitable via simple HTTP requests—no user interaction, no special permissions.</p><p>Patch. Now. Or block the header manually.</p><p>GitHub scored this 9.1 CRITICAL, but the real issue? This flaw exposes a systemic weakness in middleware validation, and some vendors weren’t exactly upfront about the risks.</p><p>Details + POC: <a href="https://zeropath.com/blog/nextjs-middleware-cve-2025-29927-auth-bypass" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">zeropath.com/blog/nextjs-middl</span><span class="invisible">eware-cve-2025-29927-auth-bypass</span></a><br>NVD: <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29927" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nvd.nist.gov/vuln/detail/CVE-2</span><span class="invisible">025-29927</span></a></p><p>Security theater is easy. Secure defaults and transparency are harder—but essential.</p><p><a href="https://hachyderm.io/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://hachyderm.io/tags/AppSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSec</span></a> <a href="https://hachyderm.io/tags/NextJS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NextJS</span></a> <a href="https://hachyderm.io/tags/CVE202529927" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202529927</span></a> <a href="https://hachyderm.io/tags/middleware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>middleware</span></a> <a href="https://hachyderm.io/tags/securityfail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityfail</span></a></p>
Hacker News<p>Next.js and the corrupt middleware: the authorizing artifact</p><p><a href="https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">zhero-web-sec.github.io/resear</span><span class="invisible">ch-and-things/nextjs-and-the-corrupt-middleware</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Next" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Next</span></a>.js <a href="https://mastodon.social/tags/corrupt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>corrupt</span></a> <a href="https://mastodon.social/tags/middleware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>middleware</span></a> <a href="https://mastodon.social/tags/authorizing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authorizing</span></a> <a href="https://mastodon.social/tags/artifact" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>artifact</span></a> <a href="https://mastodon.social/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://chow.fan/@mookie" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mookie</span></a></span> also wothput <a href="https://infosec.space/tags/Backend" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backend</span></a> or <a href="https://infosec.space/tags/Middleware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Middleware</span></a> we'd constantly see <a href="https://infosec.space/tags/Skiddies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Skiddies</span></a> fuck up everything!</p>
devsimsek<p>🌐 Building A Dynamic PHP Router Library<br>Hey people 👋, ever wondered how URLs are routed to fancy actions in web apps? 🚀<br>Check out my latest tutorial 🌟 where I break down PHP routing with handlers, middleware, and dynamic URLs!</p><p>→ Learn more here: <a href="https://smsk.dev/go/7k5u2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">smsk.dev/go/7k5u2/</span><span class="invisible"></span></a></p><p>🔧 Let's simplify the complex! <a href="https://mastodon.social/tags/PHP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PHP</span></a> <a href="https://mastodon.social/tags/WebDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebDevelopment</span></a> <a href="https://mastodon.social/tags/Middleware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Middleware</span></a> <a href="https://mastodon.social/tags/Routing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Routing</span></a> 🌍</p>
Ben Ptacek<p>I will do a quick <a href="https://fosstodon.org/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a>...</p><p>Mainly a tech geek that is currently focused on tech such as <a href="https://fosstodon.org/tags/kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kubernetes</span></a> <a href="https://fosstodon.org/tags/terraform" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>terraform</span></a> <a href="https://fosstodon.org/tags/ansible" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ansible</span></a> and general <a href="https://fosstodon.org/tags/cicd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cicd</span></a> technologies.</p><p>Love my <a href="https://fosstodon.org/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a>, but would like to get into more of a minimal power homelab. Using <a href="https://fosstodon.org/tags/rancher" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rancher</span></a> with RKE2 and EKS (kubernetes) that is mostly automated. I also dabble in <a href="https://fosstodon.org/tags/vmware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vmware</span></a> and <a href="https://fosstodon.org/tags/mikrotik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mikrotik</span></a>, but previous backgrounds are in many <a href="https://fosstodon.org/tags/middleware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>middleware</span></a> technologies.</p><p>Excited to learn more about <a href="https://fosstodon.org/tags/fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fediverse</span></a> as I go.</p>