Henryk Plötz on Nostr: Today's entry in "Wow, that's a Bullshit CVE": Basically, if you evaluate remote user ...
Today's entry in "Wow, that's a Bullshit CVE":
https://www.exploit-db.com/exploits/46386Basically, if you evaluate remote user input as code, the remote user can execute code. *shockedpikachuface*
I would like to point out that CVEs define publicly known vulnerabilities in publicly released software packages. So if the guy/gal wants to publicly release their "example code" as a software package, they could get a CVE for *that*. But not for the code eval function they misused.
Published at
2024-08-27 07:55:01Event JSON
{
"id": "fdfd8ce62f6ee29cfd87040d00bc20066ee550a3b59681a75d12d2c84a4e0c17",
"pubkey": "49059856f287358d8b2c1ebb212b14cae596591d642850d9bdb068ad3c13eb2e",
"created_at": 1724745301,
"kind": 1,
"tags": [
[
"proxy",
"https://chaos.social/users/henryk/statuses/113032908071651912",
"activitypub"
]
],
"content": "Today's entry in \"Wow, that's a Bullshit CVE\": https://www.exploit-db.com/exploits/46386\n\nBasically, if you evaluate remote user input as code, the remote user can execute code. *shockedpikachuface*\n\nI would like to point out that CVEs define publicly known vulnerabilities in publicly released software packages. So if the guy/gal wants to publicly release their \"example code\" as a software package, they could get a CVE for *that*. But not for the code eval function they misused.",
"sig": "6d7016c6c7d760991aa129a9b7e42ddeecdd71786a9c564cff24d2759d77430b558a1dff8e460f6836958597f1ea8b7ba0deb166683472c52bfee832101a9358"
}