• =?UTF-8?B?4oCcVGhl?= Silent, Fileless Threat Of =?UTF-8?B?VlNoZWxs4oCZ

    From Lawrence =?iso-8859-13?q?D=FFOlivei@3:633/280.2 to All on Wednesday, August 27, 2025 17:48:14
    Subject: =?UTF-8?B?4oCcVGhl?= Silent, Fileless Threat Of
    =?UTF-8?B?VlNoZWxs4oCZ?=

    So, there is this new *nix-specific “vulnerability” that cleverly
    encodes the malicious commands in the file name, not the file contents <https://www.trellix.com/blogs/research/the-silent-fileless-threat-of-vshell/>.

    Except I don’t understand how you could fall for it. All the examples
    they give for the exploit involve the use of the “eval” command on
    that filename string ... well, duh.

    This part is equal parts mystifying and amusing:

    [missing pronoun?] cannot manually create a file with this name in
    the shell due to its special characters being interpreted as
    command syntax

    Don’t they know anything about *nix command shells?

    --- MBSE BBS v1.1.2 (Linux-x86_64)
    * Origin: A noiseless patient Spider (3:633/280.2@fidonet)
  • From Janis Papanagnou@3:633/280.2 to All on Wednesday, August 27, 2025 23:20:26
    Subject: =?UTF-8?Q?Re:_=e2=80=9cThe_Silent=2c_Fileless_Threat_Of_VShell?=
    =?UTF-8?B?4oCZ?=

    On 27.08.2025 09:48, Lawrence D’Oliveiro wrote:
    So, there is this new *nix-specific “vulnerability” that cleverly
    encodes the malicious commands in the file name, not the file contents
    [ snip commercial link ]

    Except I don’t understand how you could fall for it. All the examples
    they give for the exploit involve the use of the “eval” command on
    that filename string ... well, duh.

    Yes. But what do you expect from a company that *sells* "security"?
    There's tons of trash like that on the Internet!

    (For the informed folks here it's first of all just a waste of time
    reading; I'd suggest to abstain from spreading links with such ads/ FUD/misleading information. Its dissemination doesn't help anyone.)

    Janis

    [...]


    --- MBSE BBS v1.1.2 (Linux-x86_64)
    * Origin: A noiseless patient Spider (3:633/280.2@fidonet)
  • From Jim Diamond@3:633/280.2 to All on Thursday, August 28, 2025 06:19:20
    Subject: Re: =?UTF-8?Q?=E2=80=9CThe?= Silent, Fileless Threat Of
    =?UTF-8?Q?VShell=E2=80=99?=

    On 2025-08-27 at 04:48 ADT, Lawrence D’Oliveiro <ldo@nz.invalid> wrote:
    So, there is this new *nix-specific “vulnerability” that cleverly
    encodes the malicious commands in the file name, not the file contents
    <https://www.trellix.com/blogs/research/the-silent-fileless-threat-of-vshell/>.

    Except I don’t understand how you could fall for it. All the examples
    they give for the exploit involve the use of the “eval” command on
    that filename string ... well, duh.

    This part is equal parts mystifying and amusing:

    [missing pronoun?] cannot manually create a file with this name in
    the shell due to its special characters being interpreted as
    command syntax

    Don’t they know anything about *nix command shells?

    Apparently not. Which makes me wonder about the validity of anything else
    they have to say.


    I think Janis' reply to your (Lawrence's) comment is a bit harsh. As
    bizarre as it might be to trigger a bug like this, it is (IMHO) an
    interesting reminder of how using eval is so often a risky move.


    Jim

    --- MBSE BBS v1.1.2 (Linux-x86_64)
    * Origin: A noiseless patient Spider (3:633/280.2@fidonet)
  • From Janis Papanagnou@3:633/280.2 to All on Thursday, August 28, 2025 14:23:36
    Subject: =?UTF-8?Q?Re:_=e2=80=9cThe_Silent=2c_Fileless_Threat_Of_VShell?=
    =?UTF-8?B?4oCZ?=

    On 27.08.2025 22:19, Jim Diamond wrote:
    On 2025-08-27 at 04:48 ADT, Lawrence D’Oliveiro <ldo@nz.invalid> wrote:
    ["security" related sort of adds of a commercial company]

    [...] it is (IMHO) an
    interesting reminder of how using eval is so often a risky move.

    The inherent shell programming security problem [that Lawrence
    already identified] (and that is well known since decades!) is
    in that ads hidden in a bunch of distractions from the problem.
    Of course with a simple and to the point elaboration on 'eval'
    they wouldn't sell anything, neither tools nor expertise.

    If you want to be reminded on the problem of 'eval' get texts
    (or write texts) about that, and spread the word for the good
    of all. (I've had a paragraph on 'eval' explicitly put in our
    company coding standards back in the early/mid 1990's.)

    But meanwhile that should be anyway already commonly known.[*]

    Janis

    [*] Of course you shouldn't let amateurs [without expertise
    or supervision] do shell programming for critical Real World
    systems. IMHO.


    --- MBSE BBS v1.1.2 (Linux-x86_64)
    * Origin: A noiseless patient Spider (3:633/280.2@fidonet)
  • From Jim Diamond@3:633/280.2 to All on Monday, September 01, 2025 09:03:52
    Subject: Re: =?UTF-8?Q?=E2=80=9CThe?= Silent, Fileless Threat Of
    =?UTF-8?Q?VShell=E2=80=99?=

    On 2025-08-28 at 01:23 ADT, Janis Papanagnou <janis_papanagnou+ng@hotmail.com> wrote:
    On 27.08.2025 22:19, Jim Diamond wrote:
    On 2025-08-27 at 04:48 ADT, Lawrence D’Oliveiro <ldo@nz.invalid> wrote: >>> ["security" related sort of adds of a commercial company]

    [...] it is (IMHO) an
    interesting reminder of how using eval is so often a risky move.

    The inherent shell programming security problem [that Lawrence
    already identified] (and that is well known since decades!) is
    in that ads hidden in a bunch of distractions from the problem.
    Of course with a simple and to the point elaboration on 'eval'
    they wouldn't sell anything, neither tools nor expertise.

    If you want to be reminded on the problem of 'eval' get texts
    (or write texts) about that, and spread the word for the good
    of all. (I've had a paragraph on 'eval' explicitly put in our
    company coding standards back in the early/mid 1990's.)

    But meanwhile that should be anyway already commonly known.[*]

    Yes, to people who have done shell programming for a while (or very
    diligent beginners). But there are always new, aspiring shell programmers coming along.

    In any case, I found this particular example a bit more subtle than the
    usual "obvious" dangers of using eval.

    [*] Of course you shouldn't let amateurs [without expertise
    or supervision] do shell programming for critical Real World
    systems. IMHO.

    Not just shell programming... amateurs can much up any other kind of programming too.

    Jim


    --- MBSE BBS v1.1.2 (Linux-x86_64)
    * Origin: A noiseless patient Spider (3:633/280.2@fidonet)