Everything old is new again. Or rather, anything not completely patched will be the gift that keeps on giving. Reading the https://leucosite.com/Microsoft-Edge-RCE/ … writeup on CVE-2018-8495 is giving me some serious déjà vu. And some wonders why it took so long for somebody to discover / exploit.https://twitter.com/ryHanson/status/1437873170552279040 …
-
-
In my tests, .wsh issued a prompt (in contrast to .cpl and several others). Not that it would stop the attack :)
-
*IE* did prompt when opening a .WSH:// URI, as it has a \Shell\Open entry. However, don't forget that there was also a confused deputy involved in the ITW CVE-2021-40444 exploit. That's how it achieved the file placement via ActiveX/CAB. Nothing special about .WSH: though...pic.twitter.com/OjdOVKejE3
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.