So, there is this new *nix-specific rCLvulnerabilityrCY that cleverly
encodes the malicious commands in the file name, not the file contents
[ snip commercial link ]
Except I donrCOt understand how you could fall for it. All the examples
they give for the exploit involve the use of the rCLevalrCY command on
that filename string ... well, duh.
[...]
So, there is this new *nix-specific rCLvulnerabilityrCY that cleverly
encodes the malicious commands in the file name, not the file contents
<https://www.trellix.com/blogs/research/the-silent-fileless-threat-of-vshell/>.
Except I donrCOt understand how you could fall for it. All the examples
they give for the exploit involve the use of the rCLevalrCY command on
that filename string ... well, duh.
This part is equal parts mystifying and amusing:
[missing pronoun?] cannot manually create a file with this name in
the shell due to its special characters being interpreted as
command syntax
DonrCOt they know anything about *nix command shells?
On 2025-08-27 at 04:48 ADT, Lawrence DrCOOliveiro <ldo@nz.invalid> wrote:
["security" related sort of adds of a commercial company]
[...] it is (IMHO) an
interesting reminder of how using eval is so often a risky move.
On 27.08.2025 22:19, Jim Diamond wrote:
On 2025-08-27 at 04:48 ADT, Lawrence DrCOOliveiro <ldo@nz.invalid> wrote: >>> ["security" related sort of adds of a commercial company]
[...] it is (IMHO) an
interesting reminder of how using eval is so often a risky move.
The inherent shell programming security problem [that Lawrence
already identified] (and that is well known since decades!) is
in that ads hidden in a bunch of distractions from the problem.
Of course with a simple and to the point elaboration on 'eval'
they wouldn't sell anything, neither tools nor expertise.
If you want to be reminded on the problem of 'eval' get texts
(or write texts) about that, and spread the word for the good
of all. (I've had a paragraph on 'eval' explicitly put in our
company coding standards back in the early/mid 1990's.)
But meanwhile that should be anyway already commonly known.[*]
[*] Of course you shouldn't let amateurs [without expertise
or supervision] do shell programming for critical Real World
systems. IMHO.
| Sysop: | Amessyroom |
|---|---|
| Location: | Fayetteville, NC |
| Users: | 54 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 01:55:50 |
| Calls: | 743 |
| Files: | 1,218 |
| Messages: | 187,760 |