• infeeeee@lemmy.zip
    link
    fedilink
    English
    arrow-up
    47
    ·
    4 days ago

    Improper neutralization of special elements used in a command (‘command injection’) in Windows Notepad App allows an unauthorized attacker to execute code over a network.

    An attacker could trick a user into clicking a malicious link inside a Markdown file opened in Notepad, causing the application to launch unverified protocols that load and execute remote files.

    TIL notepad can render markdown

  • x00z@lemmy.world
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    2
    ·
    4 days ago

    I hate the absolute misuse of the RCE definition. An RCE used to not have any user interaction.

  • MonkderVierte@lemmy.zip
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    edit-2
    4 days ago

    8.8 CVSS

    Vibecoding (and Resumé-driven dev) doing it’s thing.

    Btw, Metapad is still around and portable. And so are Notepad 2/3/4/++.

  • _edge@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 days ago

    Is there a non-sense free description.

    So far, i learned that notepad can open links from Markdown. I assume Markdown calls some Windows API open(link) where link is any string. That’s hardly a vulnerability by itself, that’s working as designed.

    Where does the code execution happen? Is it open(https://hackersite.com/exploite.exe)? Can’t be. They’re not that stupid.

    Is it open(file:///PowerShell.exe?atbitaryCodeHere)? Who would allow this?

    Or open(teams://magic/doThing)?

    This sounds like trying to blame notepad (and by proxy all app developers) for a design flaw in the ecosystem