HACKLOG 2x19 - Attacchi Command Execution (PHP)

https://peertube.uno/w/a6o2zC3L8rsi55hBDxz4fj

HACKLOG 2x19 - Attacchi Command Execution (PHP)

PeerTube
New Windows Task Scheduler Vulnerabilities Allows Command Execution as Admin User

Critical Windows Task Scheduler involving the schtasks.exe binary could enable malicious actors to execute commands with SYSTEM-level privileges, bypass User Account Control (UAC) prompts, and erase audit logs.

Cyber Security News

Are there any examples of remote arbitrary command execution, where the command was not executed within a shell but as an individual command with arguments only (aka no env vars, no pipes, no semicolons, etc, only program --arg1 --arg2 ...). Almost every programming language has the ability to execute commands as individual programs (fork() + execve()) or within a sub-shell (ex: $SHELL -c "..."). Is it worth making the distinction between non-shell command execution and in-shell command execution? /cc @kurtseifried

#commandexecution #vulnerabilities