RCE Vulnerability Concerns

The cluster centers on debates about remote code execution (RCE) risks in software tools and clients that process untrusted input without proper sandboxing or mitigations, often referencing CVEs and potential exploits like arbitrary code execution from console output or file parsing.

➡️ Stable 0.7x Security
4,428
Comments
20
Years Active
5
Top Authors
#3905
Topic ID

Activity Over Time

2007
3
2008
8
2009
37
2010
47
2011
82
2012
75
2013
209
2014
494
2015
199
2016
298
2017
206
2018
261
2019
257
2020
282
2021
460
2022
344
2023
338
2024
326
2025
460
2026
42

Keywords

MCP samba.org DB JSON SQL XML ONE OK attachment.cgi blog.fefe code execution code execution exploit remote untrusted arbitrary input shell fossil

Sample Comments

thekingofspain Jul 10, 2015 View on HN

It's bad if it's susceptible to running an attacker's arbitrary code.

gruez Aug 29, 2020 View on HN

Your response entirely fails to address the parent's concern about security. It's like responding to a RCE in your backend with "yeah it's there but we'll trust the users to not use it"

zmzrr Dec 11, 2019 View on HN

This is like when `strings' was found to be vulnerable to code execution because it was parsing ELF files.

gsuuon Oct 20, 2023 View on HN

You don't even need to run something untrusted, just compromised console output is enough (from server logs, for example they mention python -m http.server)

makach Mar 11, 2020 View on HN

it's a valid question! From the github the author writes "Despite being highly privileged and processing untrusted input by design, it is unsandboxed and has poor mitigation coverage. Any vulnerabilities in this process are critical, and easily accessible to remote attackers."

tinus_hn May 5, 2020 View on HN

Like the ‘zeroday vulnerability’ of users pasting commands into a prompt.

pudo Jul 6, 2021 View on HN

I can't wait for this to accidentally become a vector for an RCE... :)

hsnewman Jul 3, 2017 View on HN

Can this be exploited for malicious code?

Zeromika Jan 30, 2022 View on HN

It is plain surprising to see this gets a CVE. What is the next exploit? Calling `system(program)`?

wyager Mar 11, 2017 View on HN

Yes, my concern is that this functionality is baked into the client and is at a high risk of being executable remotely.