You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Click Test in the preview on the right, and the local calc.exe program is executed.
I uploaded a demo video of using this vulnerability to attack here:
https://hldx.cowtransfer.com/s/c0b8ee3aa37b48
In the demo video, after the user clicks AttTest (it looks like a hyperlink) in the Qilin Editor, the computer will execute malicious code and be controlled by the attacker (the whoami command is executed in the demo video and the A new text file with the content test is created under the C:\ directory), and the user has no knowledge of this.
The text was updated successfully, but these errors were encountered:
When using
nw.js
, the security of the code is not verified, so that theexec()
inchild_process
can be called to execute malicious code.For example, add the following content in the md file:
Click
Test
in the preview on the right to execute JavaScript pop-up code, which is XSS vulnerability (Cross Site Scripting).Run the local
calc.exe
code through theexec()
function in the "child_process" module:Click
Test
in the preview on the right, and the localcalc.exe
program is executed.I uploaded a demo video of using this vulnerability to attack here:
In the demo video, after the user clicks
AttTest
(it looks like a hyperlink) in theQilin Editor
, the computer will execute malicious code and be controlled by the attacker (thewhoami
command is executed in the demo video and the A new text file with the contenttest
is created under theC:\
directory), and the user has no knowledge of this.The text was updated successfully, but these errors were encountered: