Page 1 / 1 des 1 bookmarks du jour 11-01-2025

Allow arbitrary URLs, expect arbitrary code execution | Positive Security

In this post, we show code execution vulnerabilities in numerous desktop applications, all with the same root cause: insufficient validation of user input that is later treated as a URL and opened with the help of the operating system. The required user interaction and exploitation strategy depends on the desktop environment and whether the application was hardened, for instance, with a URI-scheme allow/block list. As an example, here is what exploitation of this issue in Nextcloud (< 3.1.3) on Xubuntu 20.04 looks like:

Ajouté par inwebo le 2025-01-11. Permalink

tags️ : web