TIL that on windows, cmd.exe /c implements a CVE for you by default, by automagically interpreting any passed *command line* as a *filename with spaces*. You need to pass /s to turn off the free CVE. So cmd /c "ping http://evil.com/../../../../../../windows/calc.exe" pops calc.
-
-
So the reason this is a vulnerability, not just a bug, would be if they're running a script that uses cmd /c "some string built from your user input", if your user input can contain \..\ you can pop calc (or some other exploitable exe)?
-
Yes, even if the string is otherwise also a valid command that would perform some other function.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.