Windows Has a Critical Command Injection Bug

  Рет қаралды 107,213

Mental Outlaw

Mental Outlaw

Ай бұрын

In this video I demonstrate the 'BatBadBut' Bug that allows command injection on Windows machines in different programming languages. Don't let people send user input to random batch scripts.
My merch is available at
based.win/
Subscribe to me on Odysee.com
odysee.com/@AlphaNerd:8
₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
Monero
45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF

Пікірлер: 774
@Stevie-J
@Stevie-J Ай бұрын
Name a more iconic duo than Windows and backdoors for federal agencies (you can't)
@HarambeeOffical
@HarambeeOffical Ай бұрын
North Korea and red star os
@eldrago19
@eldrago19 Ай бұрын
XZ utils and backdoors?
@michaelflynn6952
@michaelflynn6952 Ай бұрын
how is this a backdoor? how would it work remotely? what programs allow a remote user to add an arbitrary string of arguments to a windows batch file or linux shell file?
@Splarkszter
@Splarkszter Ай бұрын
​@@eldrago19 That was fixed as soon as it was discovered.
@qqqalo
@qqqalo Ай бұрын
The youtuber Low Level Learning has a video on this, where he demonstrates how it can also happen on linux. It's hardly even a bug. In order for it to be executed, the attacker has to have the ability to input strings from the stdin. If they can do that, then they've already probably already got the ability to run commands anyway.
@metalmollusquetv
@metalmollusquetv Ай бұрын
>Windows Has a Critical Command Injection Bug Yeah, it's called windows
@k-c
@k-c Ай бұрын
Windows = Open Front Doors
@mapron1
@mapron1 Ай бұрын
@@k-c Just a clickbait. Vulnerability is in Rust, not Windows.
@kidnamedfinger.productions
@kidnamedfinger.productions Ай бұрын
@@mapron1 Windows design is weird and this is why this vulnerability exists in the first place.
@zedev444
@zedev444 Ай бұрын
@@mapron1 vulnerability IS IN windows, not rust. That's why Java said won't fix, Glownie.
@kuroenekodemon
@kuroenekodemon Ай бұрын
Windows has a problem where it leaves the front door and the back door wide open for all to see with no plans to fix it 😂
@HA7DN
@HA7DN Ай бұрын
Next week: 10/10 critical bug: the coffee maker is broken!
@RainbowPigeon15
@RainbowPigeon15 Ай бұрын
what's broken? It always returns 418!
@vytah
@vytah Ай бұрын
@@RainbowPigeon15 that's broken, only teapots should return 418
@4n4Queen
@4n4Queen Ай бұрын
Palo alto introduce itself.
@yeshi3522
@yeshi3522 Ай бұрын
fun part about this is how we've known variables enclosed in % are vulnerable to injection for decades at this point (along with %num or %*) people never learn i suppose
@the_Datana
@the_Datana Ай бұрын
It's so obvious that it's forgotten
@the_expidition427
@the_expidition427 Ай бұрын
@@the_Datana Tradition is a solution to a problem after the problem is forgotten now be sure not to forget the problem either
@icaruslives4748
@icaruslives4748 Ай бұрын
Yeshi!
@ShivterShivtik25
@ShivterShivtik25 Ай бұрын
@@icaruslives4748 small world ey
@yeshi3522
@yeshi3522 Ай бұрын
@@ShivterShivtik25 i've summoned half the batch community with a comment
@dzuchun
@dzuchun Ай бұрын
I love how log4j is now most commonly used as a reference to CVE, not library itself 😅
@asdfghyter
@asdfghyter Ай бұрын
imagine how the authors feel about it 😅
@no_name4796
@no_name4796 Ай бұрын
Which is ironic, since log4j, is a logging libraries, used to debug programs, got hit with one of the biggest vulnerabilities lol
@Mempler
@Mempler Ай бұрын
​@no_name4796 by a minecraft 2b2t hack client developer, lmao
@no_name4796
@no_name4796 Ай бұрын
@@Mempler damn. didn't know about that lol
@Naa-ee7nq
@Naa-ee7nq Ай бұрын
it pretty much set the standard for most log libraries since, you probably use their idioms and threat levels pretty much verbatim if you do logging in any half-way standard fashion
@skrundz
@skrundz Ай бұрын
If this bug was called 'clown makeup', then the headline would be "Clown wears clown makeup"
@user-hn3hb6hl9d
@user-hn3hb6hl9d Ай бұрын
"Java: Won't fix"
@fox2code
@fox2code Ай бұрын
Yeah! I think the java stance is the correct stance. The Java runtime is open source and easy to fork tho.
@geeshta
@geeshta Ай бұрын
Even if they did, the vulnerable machines are probably running Java 8 and never going to update
@twenty-fifth420
@twenty-fifth420 Ай бұрын
@@geeshtaAh yes, organizational stagnation. “If it aint broke, don’t fix it!” “Uhm, well actually, it is kind of broken-“ “ **If it aint broke don’t fix it** ”
@vytah
@vytah Ай бұрын
Java: our enterprise customers rely on this bug for their code to work
@AnAnonymousAuditor
@AnAnonymousAuditor Ай бұрын
@@vytah XKCD 1172, as always
@stefanjones8042
@stefanjones8042 Ай бұрын
You will eat zee bugz
@dclc8497
@dclc8497 Ай бұрын
You vil be backdoored. And you vil be happy
@whannabi
@whannabi Ай бұрын
So it was the Germans all along. I knew they were too calm
@indetermite
@indetermite Ай бұрын
No. I vill never eat zee bugs, or live in zee pod.
@ahmedp8009
@ahmedp8009 Ай бұрын
That WEF dude looks like the final Boss of the New World Order ... Until you beat him (after few retries and at a higher lvl) and then you face the TRUE final boss ...The Ultimate Lizard!
@blackneos940
@blackneos940 Ай бұрын
@ahmedp8009 Majora, Phase 2?
@FlavorsomeMusic
@FlavorsomeMusic Ай бұрын
"There's this new 10/10 vulnerability on windows man!" "Oh yeah ? Can you reproduce it ?" "Yeah! You need to sacrifice a goat at midnight while it's a full moon, then wait to get struck by lightning. Once you're at the hospital and you see the doctor, you need to slip this magic medallion into his pocket, and then you need to have a baby with the nurse. Then you'll get remote code execution on your computer. This is abhorrent man." I still think it should be patched, but 10/10 vulnerability ? lol, it just desensitizes people who are less informed about IT security. ;o
@rusi6219
@rusi6219 Ай бұрын
The steps you've listed is probably just a usual Saturday night for a Rust dev
@FlavorsomeMusic
@FlavorsomeMusic Ай бұрын
@@rusi6219 rofl I don't touch rust at all, thanks for the enlightening statement. :D
@danieltr94
@danieltr94 Ай бұрын
Shout out to Frostb1te for releasing a PoC early on. I bet there would've been a HUGE panic if no PoC was released and the 10/10 rating went through people imaginations.
@DVSProductions
@DVSProductions Ай бұрын
Imagine not sanitizing inputs and then beeing confused to get remote code execution. It's like people have forgotten about sql injections
@jerycaryy4342
@jerycaryy4342 Ай бұрын
Lmao yea, the only part I'm surprised about is that you actually need the escape character 😂
@gauxalot
@gauxalot Ай бұрын
so true. i still dont understand how giving the user access to directly modify a command that will be executed is a windows vulnerability
@vytah
@vytah Ай бұрын
It's more like the programmer was using a prepared statement and got an SQL injection anyway. The API was supposed to do all the necessary escaping
@jongxina3595
@jongxina3595 Ай бұрын
sql injection is like the very first thing people teach you about hacking... so its insane to think app devs dont sanitize their inputs, specially when letting a user execute a bat file on their server.... which on itself is such a bad thing to do.
@edgeworksgames
@edgeworksgames Ай бұрын
Please watch 5 minutes into the video
@theevilcottonball
@theevilcottonball Ай бұрын
By the way even Windows APIs find it too difficult to encode separate args into a command-line string. You can get the arguments out of the command line string by calling CommandLineToArgv but the windows APIs provide no encoder (i. e. there is no ArgvToCommandLine). Rust got the implementation of this encoder wrong. (ya see folks, microsoft wisely did not even try)
@vytah
@vytah Ай бұрын
Here's the thing: cmd.exe has a completely different decoder, and in theory any program can have a different decoder. For example, programs compiled under Cygwin have a decoder that autoexpands glob patterns. All those vulnerable runtimes implement the encoder for the standard argument encoding correctly, it's just it's not the only encoding they need to care about.
@theevilcottonball
@theevilcottonball Ай бұрын
> Here's the thing: cmd.exe has a completely different decoder Well you mean that cmd does not use CommandLineToArgvW. well, CommandlineToArgv would split `hello" & mspaint.exe` into `hello` and `& mspaint.exe`, so probably yes. > it's just it's not the only encoding they need to care about. Well windows has weird rules about argument quoting. I read an article "A Better Way To Understand Quoting and Escaping of Windows Command Line Arguments" once but it now only available on the archive that explains it. > All those vulnerable runtimes Well most of the programs that are using these decoders are not shells, so they will not run arbitrary commands. If you already have access to the commandline flags, then you can often pretty much everything the program can do, there is no need to trick the argument parser.
@dm-vh3xj
@dm-vh3xj Ай бұрын
​​@@theevilcottonball There are no rules about arguments quoting in Windows because any program can parse the command line in any way it sees fit.
@theevilcottonball
@theevilcottonball Ай бұрын
@@dm-vh3xj Well I was talking about the standard rules. Of course you can parse the way you want.
@dm-vh3xj
@dm-vh3xj Ай бұрын
@@theevilcottonball if by standard rules you mean cmd.exe rules then I agree.
@YouHaveTrouble
@YouHaveTrouble Ай бұрын
It doesn't really matter if theres any privilege escalation because average winddos user will run everything as administrator anyway
@rusi6219
@rusi6219 Ай бұрын
The TempleOS way Windows users are clearly superior to you
@Xanax55
@Xanax55 Ай бұрын
Or they will just bypass it with cmstp or fodhelper (It's kinda patched but still works with dll injecting) exploit.
@hovnocuc4551
@hovnocuc4551 Ай бұрын
haha, i use linux, i'm so much better than everyone else. anyone who uses windows must be a retard, amrite guys? /s
@hl-tt
@hl-tt Ай бұрын
That doesn't matter because apps can just bypass the UAC
@mdm032
@mdm032 Ай бұрын
What if you have completely uninstalled all windows apps like the store, edge, all the app extensions, and one drive of course and then all telemetry i can. I sometimes completely block the updates and ports too
@hcmtnbiker
@hcmtnbiker Ай бұрын
Sanitization of user input is always the developers job, not the language. Calling this a 10/10 critiral vulnerability is like saying that every language you can think of for web development with SQL bindings has problems because SQL injection can be performed if you don't properly sanitize the inputs. It's not the fault of the language.
@jerycaryy4342
@jerycaryy4342 Ай бұрын
Yea this should be like a 2/10. If I were writing code that took user input and performed bash on it I'd probably expect that if I didn't sanitize it the user could do RCE. The only thing I'm surprised about is you need the escape character 😂
@thenwhoami
@thenwhoami Ай бұрын
The difference being developers are almost never expected to do the basic parsing that tells their program which arguments it has received.. which is what this bug concerns.
@MatthewHaydenRE
@MatthewHaydenRE Ай бұрын
If I understand the issue properly, the vulnerability allows someone to escape any sanitisation.
@guiorgy
@guiorgy Ай бұрын
Ideally, sanitization should not be necessary, and parameters/arguments should be passed separately so the reciever can handle them appropriately. SQL does that through the use of parameters in the query. The problem here was that the user input was passed in as an argument, which was expected to be safe.
@transcendtient
@transcendtient Ай бұрын
@@guiorgy I think you're confused because "SQL" doesn't sanitize anything. I'm pretty sure you're talking about prepared statements and the implementation of prepared statements is at the application level.
@moonskined
@moonskined Ай бұрын
This is overblown, this shouldn't be 10/10
@Sleestiq
@Sleestiq Ай бұрын
Agreed
@s1l3nttt
@s1l3nttt Ай бұрын
True, still a pretty big oversight.
@vytah
@vytah Ай бұрын
If the program is vulnerable, then an unprivileged user can, over the network, run arbitrary code on the target machine, without anyone else's input, and it's very easy to do so. 10 seems reasonable. Scoring does not take into account how often the vulnerability occurs.
@walksanator
@walksanator Ай бұрын
10 is for things access escalation and remote code.*both* not one or the other
@hummel6364
@hummel6364 Ай бұрын
7:15 if there is a program that does this, then it runs on Windows Vista, is written in Java 6, and specifically relies on this bug to work.
@RenderingUser
@RenderingUser Ай бұрын
classic xkcd 1172
@hummel6364
@hummel6364 Ай бұрын
@@RenderingUser Correct. I should have thought of that.
@erikp6614
@erikp6614 Ай бұрын
Well, the liblzma/xz bug did certainly not backdoor the "ssh process for most of the linux servers out there on the internet". The bug was found shortly after it was introduced and is not compiled into every version of sshd. Unless most servers on the internet use a bleeding edge version of the library, few servers was actually was affected.
@flowerpt
@flowerpt Ай бұрын
I do NOT want to watch anybody cooking parrots.
@jtbebop497
@jtbebop497 Ай бұрын
​@@flowerpt 😂😂😂
@waterbloom1213
@waterbloom1213 Ай бұрын
My understanding is that it could have had a massive impact had it not been detected so soon. It took a month to detect the malicious code, if stable distro updates had been released then it is very reasonable to believe hundreds millions of computers would have been affected.
@erikp6614
@erikp6614 Ай бұрын
@@waterbloom1213 Yes! That is my understanding as well. However it did not backdoor most linux servers on the internet. The number of internet facing servers actually affected was probably limited. Furthermore, to actually use the backdoor the attacker needed a private key. It is possible that the person who introduced the backdoor wanted to sell the private key or somehow make money of it in some other way, but unless you had the private key you could not use the backdoor. Nevertheless, in the video the claim is that the "ssh process for most of the linux servers out there on the internet" had the backdoor. This is simply not true.
@threestans9096
@threestans9096 Ай бұрын
he parrots headlines and fills in the blanks with his biased “facts”. its actually getting kinda annoying. also, why does the thumbnail imply RUST is the problem…but he says windows..
@JabbaTiure
@JabbaTiure Ай бұрын
Nice Wojaks. Not sure if anyone else has complimented the channel’s use of wojaks in its thumbnails.
@calligraphysthetic
@calligraphysthetic Ай бұрын
brainlets :D
@electrictrojan6719
@electrictrojan6719 Ай бұрын
It's the reason I click
@synexiasaturnds727yearsago7
@synexiasaturnds727yearsago7 Ай бұрын
@@calligraphysthetic they just like me fr?
@handleneeds3charactersormore
@handleneeds3charactersormore Ай бұрын
Not sure wojaks but I know the thumbnail monerochans are well appreciated
@ixin645
@ixin645 Ай бұрын
@@synexiasaturnds727yearsago7 fax frfr
@txreqbtw
@txreqbtw Ай бұрын
Why tf would you call a batch file from any other language?
@Wampa842
@Wampa842 Ай бұрын
Bobby Tables strikes again.
@Wolkebuch99
@Wolkebuch99 Ай бұрын
That's Bobby 'Drop Table Users 😎
@demolazer
@demolazer Ай бұрын
"Won't fix" is code for "skill issue"
@RenderingUser
@RenderingUser Ай бұрын
or the fact that literally nobody has used java over version 8
@dementedd
@dementedd Ай бұрын
LMFAO i love how u replaced rust with windows and i agree
@aintnochange
@aintnochange Ай бұрын
same
@DefaultMale_
@DefaultMale_ Ай бұрын
I mean its the window commands that are rediculously bloated
@mapron1
@mapron1 Ай бұрын
Clickbait, unfortunately. I fell for it.
@c_o_m_e_t_
@c_o_m_e_t_ Ай бұрын
Future programs should be memory safe (and contain our backdoor).
@ruchevsk3165
@ruchevsk3165 Ай бұрын
This is the best timing. Right during the lunch break of your average wagie:)
@tverdyznaqs
@tverdyznaqs Ай бұрын
He really said "cmd.exe is bloated"... Like is it though? I have no idea, I'm not the type of nerd to judge that but it seems like a bit of a hot take...? That line would feel right at home on an "avarage linux user" soyjak meme, is all I'm saying
@the_synack
@the_synack Ай бұрын
It's a poor take. This is not the OS's fault.
@nuggert
@nuggert Ай бұрын
It’s pretty accurate.
@ohmsohmsohms
@ohmsohmsohms Ай бұрын
U really think it’s not lmao? Benchmark ur commands.
@the_synack
@the_synack Ай бұрын
@@ohmsohmsohms comparing against what?
@Kaizoku_apex
@Kaizoku_apex Ай бұрын
Everyone who's anyone on Windows uses Powershell/Terminal anyways. Linux just had a major security vulnerability. It's just Linux bros reaching.
@Xanax55
@Xanax55 Ай бұрын
It's not a bug tbh, the code does what it supposed to do, you can write the same code in cpp or cs and expect the same result.
@asdfghyter
@asdfghyter Ай бұрын
i think the code is supposed to do proper escaping according to the documentation, so it is indeed a bug
Ай бұрын
​@@asdfghyterI think CMD is just to old and abused. The issue is just that cmd is Windows /bin/sh programs frequently start subprocesses in shells it's not so new or bad just not for remote applications.
@rusi6219
@rusi6219 Ай бұрын
Then why constantly point out things that are lesser problems to this in C to shill Rust?
@ilikeshiba
@ilikeshiba Ай бұрын
@@rusi6219impact and decades of observed experience. I do think this is a bug because the function claims it sanitizes inputs. It is more on windows for being shitty but the function shouldn’t say one thing and do another.
@asdfghyter
@asdfghyter Ай бұрын
@ i mean sure, that’s the main cause of the issue, but because the rust code decided to take on that responsibility by saying that it escapes it in the documentation, it does indeed have that responsibility. if it said “don’t use this on windows, [do other thing] instead” or something, then it wouldn’t be a bug. or if it said “you’re responsible for escaping and ensuring no command injection” it would also be fine
@that_tabby
@that_tabby Ай бұрын
You are very wrong about how common or wrong this pattern (user input to shell) is. This is super common, mainly when a software needs to call utils like ffmpeg or whatever, and that is quite often based on a file path the user inputs. Sure, the app should always verify the parameters instead of a blind injection, but still very common and not an issue or stupid idea like you are saying.
@mk72v2oq
@mk72v2oq Ай бұрын
This does not work with arbitrary executables. You need to call cmd.exe specifically, directly or via bat file.
@ra2enjoyer708
@ra2enjoyer708 Ай бұрын
@@mk72v2oq And if you are writing `.bat` file it's very unlikely you won't invoke `cmd.exe` within it, since you are already in the territory of writing an ad-hoc script for you needs.
@mk72v2oq
@mk72v2oq Ай бұрын
​@@ra2enjoyer708 cmd is always invoked there. I.e. calling 'test.bat' implicitly expands into 'cmd.exe /c test.bat'. That's why the attack is possible in the first place.
@IndyAdvant
@IndyAdvant Ай бұрын
Thanks for making this clear 🙏
@jongxina3595
@jongxina3595 Ай бұрын
mental outlaw is a rust dev now 👀
@middleway1885
@middleway1885 Ай бұрын
Lol, reminds me when people were able to open the cd drive of those playing counter strike in the olden days...
@johnsmith8981
@johnsmith8981 Ай бұрын
This bug would be fun to set up in the THM room about command injection. It had an example of a website that pings a domain to see if its up and showed how you can use escape characters to run other bash commands. When I was doing that room my first thought was "but who would just pass arguments straight through to command line from a website?
@TextualDeviant
@TextualDeviant Ай бұрын
On another note, I love 2:36 with the second person manually handing over a normal, presumably *disconnected* keyboard for them to type on.
@steffahn
@steffahn Ай бұрын
I would have loved to also see a demo how after an update to Rust 1.77.2 the command execution no longer works.
@jaimeortega4940
@jaimeortega4940 Ай бұрын
I think I remember similar bugs in PowerShell back in the day...
@EditioCastigata
@EditioCastigata Ай бұрын
How is this a bug in the caller? They pass along the entire string as first argument, like: execve("my.bat", ["text\" & calc.exe", …]) Looks like batch, PowerShell, or whatever that is, first assembles the line and only then parses it for execution, now finding two commands.
@mr.hooman4438
@mr.hooman4438 Ай бұрын
now we call all laugh at the people who said "thats why i dont use linux"during xz
@indetermite
@indetermite Ай бұрын
Ong man
@no_name4796
@no_name4796 Ай бұрын
Xz is a backdoor which got stopped in time. In windows who knows how many backdoors are put there INTENTIONALLY That's the difference: on linux it gets caught at some point, in windows, windows itself is a backdoor into your ass
@kristoffer8609
@kristoffer8609 Ай бұрын
@@no_name4796 There's already a ton in linux as well, you just don't know about them. The XZ utils backdoor was just one that happened to be caught.
@CompuB1t
@CompuB1t Ай бұрын
​@@kristoffer8609I believe that if you can prove it. The main disadvantage with xz vulnerability was a systemd dependency with sshd. There's is no a way hack Linux because it is not standardized. But using most basic and used packages could be ways to hack the system but who knows if there are major vulnerabilities. For example, let's imagine you said. There are 17 backdoors on Linux systems, with ofuscated and hidden malware. If you can't prove it just a phrase.
@MazeFrame
@MazeFrame Ай бұрын
@@kristoffer8609 If you want secure, you will have to live with the joys of using a microkernel.
@txorimorea3869
@txorimorea3869 Ай бұрын
If mistakes when using languages like C++ are considered a flaw in the language then this is also a flaw in Rust and a Windows vulnerability. Corporations want to use code monkeys to pay them peanuts, they don't want to pay for professionals. That is the real problem.
@ShayneHartford
@ShayneHartford Ай бұрын
This flaw is with C++, the flaw is in the C++ Windows API because Windows doesn't provide a parameterized way to pass the info, so rust has to parameterize then unparameterize it, but it wasn't doing that which is the problem. every other platform accepts parameterized natively.
@PoposteriousExe-ph5em
@PoposteriousExe-ph5em Ай бұрын
All these idiots with college degrees to code don't even know how to find the critical bugs 😂 they are still on kindergarten level understandable .
@the_synack
@the_synack Ай бұрын
I disagree, it is not a Windows issue. I don't know why this is being flagged as a Windows issue, as it could easily have been a problem with other operating systems if following a similar pattern. It's the developer, not the OS's responsibility, to sanitize user inputs. No clue why they rated this 10/10. It's a bad bug but it isn't 10/10 bad.
@inLoopie
@inLoopie Ай бұрын
Why do you call it a bug? It's obviously a feature duuh
@13thravenpurple94
@13thravenpurple94 Ай бұрын
Great video Thank you
@Fred-mv8fx
@Fred-mv8fx Ай бұрын
A really common place you'll find people passing user input to batch files is gonna be wrapper scripts that set up the user environment prior to invoking whatever command was provided. I can think of a few common programs where the user always interacts with it through a batch file to make sure there are never any dumb errors due to environment configuration. If you expose one of those to a web service like a continuous integration build service, maybe you'll have something to think about.
@z_z
@z_z Ай бұрын
ok well, what if I like bugs?
@evanhuizenga8626
@evanhuizenga8626 Ай бұрын
Bugposter alert
@merkebrae
@merkebrae Ай бұрын
Random bug event!!!
@z_z
@z_z Ай бұрын
YOU WILL EAT THE SOFTWARE BUGS AND YOU WILL BE HAPPY
@j100j
@j100j Ай бұрын
@@z_z Careful there. You're gonna ratio yourself.
@z_z
@z_z Ай бұрын
​@@j100j the only ratio you should be concerned about is the ratio of homes you don't own to the homes blackrock owns
@qmac9966
@qmac9966 Ай бұрын
So basically most normal people were not affected by this bug but now we know for sure it’s window’s fault😅
Ай бұрын
No it's more the language libraries fault, it's their job to properly escape arguments, but can say that Windows makes it complicated to do that.
@Zaro2008
@Zaro2008 Ай бұрын
I don't see how this is a Windws problem. CMD does exactly what it's supposed to do.
@rusi6219
@rusi6219 Ай бұрын
Yes it's a Rust issue
@Bejker321
@Bejker321 Ай бұрын
Ah, yes the rust NSA backdoor’s been finally found I can sleep well knowing my windows 2000 server instance is safe
@skylo706
@skylo706 Ай бұрын
Nsa is probably like: goddamn, my backdoor code doesn't run on that ancient piece of tech anymore, what sorcery is this?!
@vfeuer9236
@vfeuer9236 Ай бұрын
hi kenny... could you please do an update video on the best recent practices of VPNs, like openVPN, mullvad, and wireguard (now that i'ts becoming older) and vultr hosting (this one, I don't think your referral code still working), doesn't need to be about installation, just on overview. Thanks
@ae4e746
@ae4e746 Ай бұрын
Estos dias se estan poniendo buenos los cve, ojala sigan buscando par cosas como estas
@Iswimandrun
@Iswimandrun Ай бұрын
Log4J was a mistake caused by feature creep without feature config defaults that were rational for an open source project that wasn't properly funded and supported by the community the ssh backdoor was intentional attack using next level social engineering with complicated obfuscation on an open source project as well
@plutorocks1
@plutorocks1 Ай бұрын
World: XZ backdoor vulnerability MO: Let’s talk about Windows Vulnerability
@robertramsey8871
@robertramsey8871 Ай бұрын
You know thinking of different coding languages and knowing that one day they will basically end up at the same place, it always takes me back to those futuristic cartoon and TV shows from the 80s and 90s where someone executed something on a computer and there is some very slow moving timer or meter crawling across the screen despite the fact that we know that far in the future commands should be executed nearly instantaneously. Makes me wonder if this future code or computer infrastructure has resistors across computer connections that allows or requires arbitrary amounts of time to pass before a command is executed in order to prevent a bunch of instantaneous actions from occurring that humans wouldn't be able to prevent or detect similar to what you would see in a bunch of updates processing in Linux via the terminal flashing by. Data resistors. Required security feature in the future
@stevengill1736
@stevengill1736 Ай бұрын
Then there should be data coils and capacitors too...data transformers too....err, maybe that's LLMs?
@ra2enjoyer708
@ra2enjoyer708 Ай бұрын
More like a futuristic machine will have to allocate 4/5th of its RAM for all DRM-ladden frameworks in order to pass the command through all of them.
@davidmeier1004
@davidmeier1004 Ай бұрын
and in linux the xz hack didnt really make it out of the testing environments other than arch which wasn't effected.
@utc_3
@utc_3 Ай бұрын
This month is crazy for vulnerabilities. Good to know that they are being revealed before non-federal agents use them.
@steezysnipez6921
@steezysnipez6921 Ай бұрын
You’re gonna post a full video on this but not FISA 702????
@RATsnak3
@RATsnak3 Ай бұрын
Ah, so nothing of note happened at Microsoft. Good to know, thank you for informing me!
@sdovhfunlahsvisegbakshfjbs4621
@sdovhfunlahsvisegbakshfjbs4621 Ай бұрын
One problem is that the libraries of these programming languages hide these shell shenanigans behind something that looks simple and reasonable enough so that any useful docs, if these exist, will not be read carefully, if at all. First and foremost, they offer some sort of arg list/array that reinforces the expectation that arg handling/escaping will be done by the library - as it should be. This whole cluster f"*ck is unnecessary anyway. Windows, like other MP OSes, does have a Win32 API for direct process creation without cmd.exe (shudder). Anyway, anyone who gets bit by direct exploitation due to lacking input sanitation earns part of the blame.
@niksatan
@niksatan Ай бұрын
If you want to be safe from Windows Command Injection Bug, just don't use Windows.
@_xX_me_Xx_
@_xX_me_Xx_ Ай бұрын
This ☝️
@luovuttaa
@luovuttaa Ай бұрын
If you want to spend four hours each day getting correct drivers and finding versions that actually work with your hardware then don’t use Windows.
@MrEdrftgyuji
@MrEdrftgyuji Ай бұрын
If you want to be safe from XZ Compression Exploits, don't use Windows?
@NeroCat9999vr
@NeroCat9999vr Ай бұрын
Never using Linux and everything else is outdated or doesn’t run on modern PCs. I’m never running anything except Windows because everything else is garbage. Even Windows 8 and up is garbage that should never be used. Stick to Windows 7 and never go online. Permanently safe
@anon-fz2bo
@anon-fz2bo Ай бұрын
​@@luovuttaastop with this type of comments.
@mygoodsir539
@mygoodsir539 Ай бұрын
I thought the video was gonna end when he typed shutdown lol
@willi1978
@willi1978 Ай бұрын
That rust library is meant to do that. It will run commands you give it. Wouldnt call that a vulnerability. Watch the video by lowlevellearning on the subject
@NotAlegre
@NotAlegre Ай бұрын
Scary how much of the software we take as granted can have such critical flaws since only God know when
@Kotfluegel
@Kotfluegel Ай бұрын
I might have written something years ago, that is vulnerable to that. Don't know if I still have the source. It's a small spring boot web app calling wkhtmltopdf like that which passes a URL from user input as command line argument. And if someone like me has done it, I don't think you can "count the number of vulnerable apps on your fingers and toes" anymore.
@grubo8884
@grubo8884 Ай бұрын
did you send that url to a bat file
@symbioticparasite6268
@symbioticparasite6268 Ай бұрын
Excellent when access is already gained ....
@AskAKill99
@AskAKill99 Ай бұрын
Lmao the way that works id definently say some type of 3 letter word agency.Its just so funny how you did the paint.exe,
Ай бұрын
you help me fall asleep thank you
@YeisenAchitel
@YeisenAchitel Ай бұрын
is that why the government endorsed rust?
@rusi6219
@rusi6219 Ай бұрын
Precisely
@trollerjakthetrollinggod-e7761
@trollerjakthetrollinggod-e7761 Ай бұрын
No, this isn't a Rust vulnerability.
@rusi6219
@rusi6219 Ай бұрын
​@@trollerjakthetrollinggod-e7761nothing's ever your fault
@trollerjakthetrollinggod-e7761
@trollerjakthetrollinggod-e7761 Ай бұрын
@@rusi6219 this is literally a Windows vulnerability, Linux doesn't have this. Rust can't fix the way Windows parses arguments.
@no_name4796
@no_name4796 Ай бұрын
No. Actually biden is a furry
@fakename2123
@fakename2123 Ай бұрын
wonder why the whitehouse was pushing for rust over C LOL
@apIthletIcc
@apIthletIcc Ай бұрын
Kinda wild that its really just a flaw in cmd exe but people instead blame only Rust. Crab haters, man.
@seansingh4421
@seansingh4421 Ай бұрын
I mean, unless you have total memory encryption any OS is susceptible to a well carried out cold boot attack.
@0MVR_0
@0MVR_0 23 күн бұрын
this actually is not an issue windows administration catches bat commands executed without hierarchy in the normative case, a file would need to ask for access which kicks in a user prompt. Outlaw's verification is using an application that already has full permissions.
@exzld
@exzld Ай бұрын
man.. i log4j feels like forever ago
@stemcellphone
@stemcellphone Ай бұрын
10:57 now, he wont freebase cocaine if he's driving, and it's a sunday.
@Jetstream__
@Jetstream__ Ай бұрын
Was that XP you were running? Based.
@owlmostdead9492
@owlmostdead9492 Ай бұрын
There needs to be a 10.1 rating for “oh shit nuke everything this thing touched” which would be XZ.
@tulsatrash
@tulsatrash Ай бұрын
To get your day started.
@Napert
@Napert Ай бұрын
Why is Java 8 still being worked on with latest update being released in January of this year?
@SuperStarPL
@SuperStarPL Ай бұрын
It's not a bug ffs
@goofballbiscuits3647
@goofballbiscuits3647 Ай бұрын
Haven't made a bat file in fourteen years lol I did the math on the last time I needed to. It was to configure PDAs used by my old organization's supply chain. 🎉 Fkn PDAs family 🎉
@fatayy
@fatayy Ай бұрын
Anyone know what keyboard he uses or what type of keys sound like that
@user-ef1rs5to5y
@user-ef1rs5to5y Ай бұрын
Kenny can you make a video on kicksecure?
@locust76
@locust76 Ай бұрын
2024 is the year of the 10/10 CVE, apparently
@ElSarcastro
@ElSarcastro Ай бұрын
I might be missing something but how is this a vulnerability if to use it you have to design an application in a specific way that allows users to send arbitrary commands, which are stored in a bat file by the application and then are run by said application with no checks at all? Do all DBMS have a critical vulnerability because you can do SQL injections with poorly written backend code?
@Chill57293
@Chill57293 Ай бұрын
Can you link the articles in the video description?
@TheSolidSnakeOil
@TheSolidSnakeOil Ай бұрын
Dev: There's a pretty nasty bug in you software that allows remote execution. Java: That sounds like a you problem. Git gud.
@zyxwvutsrqponmlkh
@zyxwvutsrqponmlkh Ай бұрын
10:55 Meer alcohol doesn't thrill me at all. 🙅❄👃
@LiveType
@LiveType Ай бұрын
I somehow actually encountered this piping commands to a c based string processing program through python. A little strange people consider this a 10/10 vulnerability. This is at most like a 3/10 vulnerability with a 10/10 skill issue involved.
@rusi6219
@rusi6219 Ай бұрын
When it's C it's a problem with the language when it's Rust it's a skill issue
@Sleestiq
@Sleestiq Ай бұрын
@LiveType agreed
@xodzphone
@xodzphone Ай бұрын
Rust and windows? Is it when wsl is enabled?
@Kilogya
@Kilogya Ай бұрын
Does anyone know any useful USB tools for computer analysis and any general information gathering that works with ventoy. I'm setting up an drive for repair and diagnostics with a few ISO files for installing linux and Win10, but I've yet to find any useful tools that are compatible with UEFI. I'm running a laptop that only has 32gbs of storage space, and 300nb - 2gb of space available at any given time "thanks to windows and HP bloat." I'm also considering switching to Linux (Ubuntu) to replace windows because of this issue but I need these tools incase anything may go wrong. I don't have space for backups other than simple data from browser prefs, keys, and codes that can be written in a text document. PS - My drive currently has around 6gb free so I have some space left for downloads. And I'm seriously tired of low space warnings and performance issues due to low space, please debate with me. Oh, one more thing, I'm stuck on an update from 2020 or lat 2019 thanks to this. I'm limited to my USB that is used to save senstive data and I cannot risk formating it, I only have one available at the moment, low class citizen here asking for help.
@takase5037
@takase5037 Ай бұрын
I'll put this out there: cmd.exe argument escaping is NOT the same as a program using UCRT (most programs). Windows does not have argc+argv; and UCRT emulates them following a rule. cmd.exe inherited an arcane escape rules that is ever so slightly different. The (IMO) ONLY way to escape properly for cmd.exe is to use the /S flag (iirc). It removes the first quote and the last quote of the command line string. TL;DR: blame Windows for bad design, and blame them for not addressing the bad design, and then triple blame them for not publishing THE LITERAL FIX THEY HAD WRITTEN as a part of Windows API.
@kenny-kvibe
@kenny-kvibe Ай бұрын
old bug... use ^ char to escape the " char, just like using the \ char in bash (backtick ` char in powershell)
@RucadiDev
@RucadiDev Ай бұрын
I kinda don't consider this a bug to be honest.
@mr.wednesday9173
@mr.wednesday9173 Ай бұрын
What happened to libre podcast?
@mikelchannel4080
@mikelchannel4080 Ай бұрын
> Media telling that the entire Linux ecosystem is compromised for xz. (But was only experimental branches) > Windows:
@alphabetsoup4269
@alphabetsoup4269 Ай бұрын
Link to the threat level page please
@Iswimandrun
@Iswimandrun Ай бұрын
So I have seen this in Lua projects all the time.
@mrdiamond64
@mrdiamond64 Ай бұрын
Does this exploit still work if the line with "echo" is removed?
@piguyalamode164
@piguyalamode164 Ай бұрын
Yes! The injected command is run separately from the batch file. It doesn't matter what the batch file does at all!
@mrdiamond64
@mrdiamond64 Ай бұрын
@@piguyalamode164 Oh that's interesting. Few years ago I observed that echo'ing a variable with an ampersand along with a command would lead to that command being run. I guess I completely misunderstood why the exploits worked.
@lukafireman
@lukafireman Ай бұрын
This is such an off case user situation that I can't even start to understand where someone would actually use it. Think of this, a RUST Server (Weird, right) taking user input and passing to .bat??? X"DDD I can't even understand why someone would want to do that. Also, when you've noted that this is "Not something you can handle with user input handling" I highly doubt that it's that difficult to sanitize the input. Besides, who in their right mind would even invoke .bat from rust, it just doesn't make sense to me. Using a low level language to invoke and script a super old CLI Language. I agree how you noted "You can probably count these on one hand".
@Archimedeeez
@Archimedeeez Ай бұрын
some people think crabs look like bugs FYI
@crazman123
@crazman123 Ай бұрын
Sounds like a windows issue. Glad I switched
@thatonebroski
@thatonebroski Ай бұрын
reject modernity. embrace history. reject Rust, embrace C and assembly
@rusi6219
@rusi6219 Ай бұрын
C and assembly is anything but history
@fionnanobaoighill
@fionnanobaoighill Ай бұрын
@rusi6219 🧢
@Contractor48
@Contractor48 Ай бұрын
I like my language like my sex. Slow and easy like Python.
@no_name4796
@no_name4796 Ай бұрын
Yeah. Only the linux kernel is probably more code then most programmer will ever write in their lifes and it's mostly C
@qqqalo
@qqqalo Ай бұрын
The bug is literally just having unsanitised inputs. The exact same thing would happen in C if you had the same implementation.
@TehObLiVioUs
@TehObLiVioUs Ай бұрын
jokes on you my command prompt and power shell in windows are broken hahahaha i swear the environment variables or something are messed up hence almost every command is broken haha ):
@user-wb7ot7kt3x
@user-wb7ot7kt3x Ай бұрын
Ah yes the motto of microsoft: better sorry than safe
Hermit Spyware Being Used By Government and ISP's To Spy On You
11:13
Mental Outlaw
Рет қаралды 115 М.
Is Valorant Spyware?
8:15
The PC Security Channel
Рет қаралды 691 М.
顔面水槽がブサイク過ぎるwwwww
00:58
はじめしゃちょー(hajime)
Рет қаралды 120 МЛН
Como ela fez isso? 😲
00:12
Los Wagners
Рет қаралды 21 МЛН
КАРМАНЧИК 2 СЕЗОН 5 СЕРИЯ
27:21
Inter Production
Рет қаралды 499 М.
new linux exploit is absolutely insane
8:29
Low Level Learning
Рет қаралды 413 М.
Why is GNU/Linux the Most Secure Desktop Operating System?
10:02
Mental Outlaw
Рет қаралды 179 М.
Bad OPSEC - How The Feds Traced a Monero User
13:55
Mental Outlaw
Рет қаралды 473 М.
I Bought an AMD GPU for More Freedom
9:53
Mental Outlaw
Рет қаралды 147 М.
Attacking LLM - Prompt Injection
13:23
LiveOverflow
Рет қаралды 365 М.
This is still the best Windows OS..
9:21
Surfshark Academy
Рет қаралды 13 М.
Breaking Bitlocker - Bypassing the Windows Disk Encryption
9:11
stacksmashing
Рет қаралды 853 М.
researchers find unfixable bug in apple computers
8:32
Low Level Learning
Рет қаралды 692 М.
X86 Needs To Die
1:09:15
ThePrimeTime
Рет қаралды 363 М.
Worlds Dumbest Darknet Admin Gets Busted
14:54
Mental Outlaw
Рет қаралды 216 М.
Трагичная История Девушки 😱🔥
0:58
Смотри Под Чаёк
Рет қаралды 355 М.
What’s your charging level??
0:14
Татьяна Дука
Рет қаралды 6 МЛН
Power up all cell phones.
0:17
JL FUNNY SHORTS
Рет қаралды 47 МЛН
Эффект Карбонаро и бумажный телефон
1:01
История одного вокалиста
Рет қаралды 2,5 МЛН