<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Microservices on cybercrime.club</title><link>https://cybercrime.club/tags/microservices/</link><description>Recent content in Microservices on cybercrime.club</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 03 Apr 2026 22:37:28 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/microservices/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-33186: gRPC-Go Auth Bypass Lets Attackers Skip Deny Rules With a Missing Slash</title><link>https://cybercrime.club/posts/grpc-go-cve-2026-33186-auth-bypass/</link><pubDate>Fri, 03 Apr 2026 22:37:28 -0400</pubDate><guid>https://cybercrime.club/posts/grpc-go-cve-2026-33186-auth-bypass/</guid><description>&lt;p>A subtle path normalization flaw in gRPC-Go — tracked as CVE-2026-33186 — lets remote, unauthenticated attackers completely bypass authorization rules on any Go service that uses path-based access control. The bug rates CVSS 9.1. If your Go microservices speak gRPC and you use the official &lt;code>grpc/authz&lt;/code> package or custom interceptors based on &lt;code>info.FullMethod&lt;/code>, you need to patch now.&lt;/p>
&lt;h2 id="what-happened">What Happened&lt;/h2>
&lt;p>On March 20, 2026, the gRPC-Go team disclosed a critical authorization bypass (GHSA-p77j-4mvh-x3m3) affecting all versions of &lt;code>google.golang.org/grpc&lt;/code> before &lt;strong>v1.79.3&lt;/strong>.&lt;/p></description></item></channel></rss>