rcmaehl Posted April 10 Share Posted April 10 TL;DR: Create_Process calls cmd.exe if passed a .bat or .cmd file, however the non-standard character escaping of cmd.exe allows arbitrary code execution. NVD - CVE-2024-24576 (nist.gov) https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows argumentum 1 My UDFs are generally for me. If they aren't updated for a while, it means I'm not using them myself. As soon as I start using them again, they'll get updated.My Projects WhyNotWin11Cisco Finesse, Github, IRC UDF, WindowEx UDF Link to comment Share on other sites More sharing options...
TheDcoder Posted April 14 Share Posted April 14 The 10/10 rating for this is highly inaccurate, that should only be reserved for fully remote arbitrary code execution. I agree with the points made in this video: argumentum 1 EasyCodeIt - A cross-platform AutoIt implementation - Fund the development! (GitHub will double your donations for a limited time) DcodingTheWeb Forum - Follow for updates and Join for discussion Link to comment Share on other sites More sharing options...
Andreik Posted April 14 Share Posted April 14 2 hours ago, TheDcoder said: The 10/10 rating for this is highly inaccurate Not necessarily. If the scoring implies just the severity, this CVSS is technically correct, but it's very unlikely to find this exploit in the wild. Since there are other scores to measure other metrics of an exploit, this CVSS might reflect just a calitative metric, without taking in consideration a quantitative metric, so the scoring in this case it's accurate. If an overall score it's meant then yes, it's over rated. When the words fail... music speaks. Link to comment Share on other sites More sharing options...
TheDcoder Posted April 14 Share Posted April 14 8 hours ago, Andreik said: If the scoring implies just the severity, this CVSS is technically correct Then every code execution vulnerability should get this rating... but they don't. EasyCodeIt - A cross-platform AutoIt implementation - Fund the development! (GitHub will double your donations for a limited time) DcodingTheWeb Forum - Follow for updates and Join for discussion Link to comment Share on other sites More sharing options...
Andreik Posted April 14 Share Posted April 14 Saying that you over simplify the scoring process. It not that simple, code execution doesn't automatically mean maximum severity or same score for all kind of vulnerabilities in that class. They score a vulnerability in a given implementation and since they linked this vulnerability to rust programming language (in a stupid way) that's probably the reason why this vulnerability it's scored such high. When the words fail... music speaks. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now