Express Computer
Home  »  News  »  Tenable uncovers ‘GerriScary’ supply chain compromise vulnerability in popular Google’s open source projects

Tenable uncovers ‘GerriScary’ supply chain compromise vulnerability in popular Google’s open source projects

0 48

Tenable has identified a vulnerability in Google’s open-source code review system, Gerrit, dubbed GerriScary. The vulnerability allowed unauthorised code submission to at least 18 major Google projects, including ChromiumOS (CVE-2025-1568), Chromium, Dart, and Bazel. GerriScary could have allowed attackers to submit unauthorised code revisions to existing change requests, bypassing manual approvals and enabling malicious code injection into major projects.

Tenable researchers discovered that misconfigured permissions in Gerrit, specifically the “addPatchSet” setting, combined with the way code tickets submit requirements were inherited between revisions, created an exploitable condition. As a result, attackers could exploit automated merging bots to deploy unreviewed malicious code with no user interaction, effectively creating a zero-click supply chain compromise.

GerriScary is a stark reminder of the cascading risks inherent in open-source ecosystems and automated developer workflows, where configuration weaknesses and automation can inadvertently widen the attack surface. “In software development, trust is paramount, especially in open-source collaboration platforms like Gerrit,” said Liv Matan, Senior Security Researcher at Tenable. GerriScary exposed a critical pathway for attackers to bypass established security protocols and directly compromise the integrity of core software projects. This serves as a stark reminder that even the most robust ecosystems must meticulously scrutinise every link in their supply chain.”

Potential Impact of Gerri Scary Exploitation

If exploited, GerriScary could have allowed attackers to:

  • Inject malicious code into at least 18 widely used Google projects, such as Chromium, Bazel, and Dart
  • Bypass human review through label inheritance and automation
  • Tamper with code in software relied on by millions globally

Recommendations for Security Teams

While the specific flaw has been addressed by Google, Tenable recommends organisations use Gerrit:

  • Audit permissions, especially the “addPatchSet” setting, default
  • Disable or restrict label copying across patch sets
  • Review automation workflows to mitigate race conditions in approvals

“GerriScary underscores why proactive security is non-negotiable. As environments spiral in complexity, security teams simply must anticipate and mitigate risks before attackers even have a chance to exploit them,” added Matan.

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image