Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 23 |
Nodes: | 6 (0 / 6) |
Uptime: | 40:47:51 |
Calls: | 583 |
Calls today: | 1 |
Files: | 1,138 |
Messages: | 110,394 |
So, there is this new *nix-specific rCLvulnerabilityrCY that cleverly
encodes the malicious commands in the file name, not the file contents
[ snip commercial link ]
Except I donrCOt understand how you could fall for it. All the examples
they give for the exploit involve the use of the rCLevalrCY command on
that filename string ... well, duh.
[...]
So, there is this new *nix-specific rCLvulnerabilityrCY that cleverly
encodes the malicious commands in the file name, not the file contents
<https://www.trellix.com/blogs/research/the-silent-fileless-threat-of-vshell/>.
Except I donrCOt understand how you could fall for it. All the examples
they give for the exploit involve the use of the rCLevalrCY command on
that filename string ... well, duh.
This part is equal parts mystifying and amusing:
[missing pronoun?] cannot manually create a file with this name in
the shell due to its special characters being interpreted as
command syntax
DonrCOt they know anything about *nix command shells?
On 2025-08-27 at 04:48 ADT, Lawrence DrCOOliveiro <ldo@nz.invalid> wrote:
["security" related sort of adds of a commercial company]
[...] it is (IMHO) an
interesting reminder of how using eval is so often a risky move.