Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Microsoft: I have made Notepad✨

Microsoft: I have made Notepad✨

Scheduled Pinned Locked Moved Uncategorized
23 Posts 13 Posters 6 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • tess@mastodon.socialT tess@mastodon.social

    Microsoft: I have made Notepad✨

    Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

    favicon

    (www.cve.org)

    bretthaines@infosec.exchangeB This user is from outside of this forum
    bretthaines@infosec.exchangeB This user is from outside of this forum
    bretthaines@infosec.exchange
    wrote last edited by
    #14

    @tess
    "RCE in notepad.exe"

    Oh, you mean you opened notepad to demonstrate your RCE?

    "NO, RCE IN NOTEPAD.EXE"

    ಠ⁠_⁠ಠ

    1 Reply Last reply
    0
    • S slotos@toot.community

      @tess

      > How could an attacker exploit this vulnerability?
      >
      > An attacker could _trick a user into clicking a malicious link_ inside a Markdown file opened in Notepad, causing the application to launch unverified protocols that load and execute remote files.

      That’s not an RCE, is it?

      x0@dragonscave.spaceX This user is from outside of this forum
      x0@dragonscave.spaceX This user is from outside of this forum
      x0@dragonscave.space
      wrote last edited by
      #15

      @slotos @tess If I understand that text correctly, though not a security researcher, when they speak of unverified protocols and permission as that user they might be talking about Windows internal system protocols that can do things like change settings, not just basic shit like HTTP yeah? Or am I reading that wrong?

      S 1 Reply Last reply
      0
      • ipaschke@cyberplace.socialI ipaschke@cyberplace.social

        @slotos @HereToChewGum@fosstodon.org Which CVE do you mean exactly? The one titled "Windows Notepad App Remote Code Execution Vulnerability"? 🤡

        S This user is from outside of this forum
        S This user is from outside of this forum
        slotos@toot.community
        wrote last edited by
        #16

        @ipaschke Sure bud, now demonstrate an RCE scenario using this vulnerability.

        Asking user to paste a text into an app and then click a certain part of it does not constitute an RCE. But what do I know, I’m not an infosec person, I just read what’s written and follow available sources.

        1 Reply Last reply
        0
        • x0@dragonscave.spaceX x0@dragonscave.space

          @slotos @tess If I understand that text correctly, though not a security researcher, when they speak of unverified protocols and permission as that user they might be talking about Windows internal system protocols that can do things like change settings, not just basic shit like HTTP yeah? Or am I reading that wrong?

          S This user is from outside of this forum
          S This user is from outside of this forum
          slotos@toot.community
          wrote last edited by
          #17

          @x0 If other discussions around this are to be trusted, its using ShellExecute. So probably yes.

          All in all, don’t click on interactive elements in random files opened in notepad.

          1 Reply Last reply
          0
          • tess@mastodon.socialT tess@mastodon.social

            Microsoft: I have made Notepad✨

            Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

            favicon

            (www.cve.org)

            dat@social.g33ky.deD This user is from outside of this forum
            dat@social.g33ky.deD This user is from outside of this forum
            dat@social.g33ky.de
            wrote last edited by
            #18
            @tess would never call it "good", but your point still stands
            1 Reply Last reply
            0
            • tess@mastodon.socialT tess@mastodon.social

              Microsoft: I have made Notepad✨

              Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

              favicon

              (www.cve.org)

              vampirdaddy@chaos.socialV This user is from outside of this forum
              vampirdaddy@chaos.socialV This user is from outside of this forum
              vampirdaddy@chaos.social
              wrote last edited by
              #19

              @tess
              they basically added a notepad:// handler that was string concatenated to a system call, like basic SQL-injections.
              So a markdown file with (simplified)

              notepad://test.txt && c:\path\to\malware.exe

              passed that to cmd.exe for execution.

              The fix calls notepad.exe directly with passed-on param string.

              1 Reply Last reply
              0
              • 0x00string@infosec.exchange0 0x00string@infosec.exchange

                @tess its a local client-side bug, not an rce, so really you can also mock them for doing some 15yo bug embellishment shit too

                jpsays@mastodon.socialJ This user is from outside of this forum
                jpsays@mastodon.socialJ This user is from outside of this forum
                jpsays@mastodon.social
                wrote last edited by
                #20

                @0x00string @tess I have had personal experience with msrc liberally applying rce as well.

                I get their argument. Because it can be triggered by a user clicking on a link to open remote content, they classify that as rce.

                Pretty much any pattern where a user can be coerced remotely will likely get an rce tag is my guess.

                But it does mean that other patterns of passive listening vulnerabilities can get watered down.

                0x00string@infosec.exchange0 1 Reply Last reply
                0
                • jpsays@mastodon.socialJ jpsays@mastodon.social

                  @0x00string @tess I have had personal experience with msrc liberally applying rce as well.

                  I get their argument. Because it can be triggered by a user clicking on a link to open remote content, they classify that as rce.

                  Pretty much any pattern where a user can be coerced remotely will likely get an rce tag is my guess.

                  But it does mean that other patterns of passive listening vulnerabilities can get watered down.

                  0x00string@infosec.exchange0 This user is from outside of this forum
                  0x00string@infosec.exchange0 This user is from outside of this forum
                  0x00string@infosec.exchange
                  wrote last edited by
                  #21

                  @jpsays @tess phone calls are rce

                  0x00string@infosec.exchange0 1 Reply Last reply
                  0
                  • 0x00string@infosec.exchange0 0x00string@infosec.exchange

                    @jpsays @tess phone calls are rce

                    0x00string@infosec.exchange0 This user is from outside of this forum
                    0x00string@infosec.exchange0 This user is from outside of this forum
                    0x00string@infosec.exchange
                    wrote last edited by
                    #22

                    @jpsays @tess sending a persuasive letter is rce

                    0x00string@infosec.exchange0 1 Reply Last reply
                    0
                    • 0x00string@infosec.exchange0 0x00string@infosec.exchange

                      @jpsays @tess sending a persuasive letter is rce

                      0x00string@infosec.exchange0 This user is from outside of this forum
                      0x00string@infosec.exchange0 This user is from outside of this forum
                      0x00string@infosec.exchange
                      wrote last edited by
                      #23

                      @tess @jpsays i dont get their argument, because its logically wrong

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups