GerriScary: How Misconfigured Google Projects Almost Got a Malicious Makeover!
GerriScary, the latest plot twist in the tech world, could have turned Google’s code into a villain. Thanks to a misconfiguration in Gerrit, attackers had a sneak peek at injecting malicious code into projects like ChromiumOS. Thankfully, the heroes at Tenable reported it, and Google shut down this potential blockbuster.

Hot Take:
Looks like Google got a little too friendly with Gerrit’s permissions. If hackers were chefs, they’d be serving up some spicy code stew! But fear not, Google’s got it down to a medium simmer and even threw in a $5,000 spice of life for Tenable’s taste-testing skills. Who knew cybersecurity could be such a culinary adventure?
Key Points:
- Gerrit misconfiguration allowed potential malicious code injection into Google projects.
- The flaw, dubbed “GerriScary,” involved the addPatchSet permission and race conditions.
- Google has since limited permissions and addressed unsafe logic in the copy process.
- No evidence of exploitation was found, but Tenable still got a $5,000 bug bounty.
- GerriScary was given a CVE ID and marked as a medium-severity issue.
Already a member? Log in here