TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Exploiting Scratch with a malicious image (2021)

65 pointsby stigmaabout 3 years ago

3 comments

sp1ritabout 3 years ago
This is probably a common flaw in a lot of applications with a lot of complexity layered below the main product.<p>Electron applications are a prime example of this, since there is a whole webbrowser underneath and HTML doing HTML things is expected behavior for the browser, but not the application above. One can probably attribute the whole log4j debacle to the same fault, in that the &quot;common&quot; developer is unable to understand all complexity and quirks their software ships with (difference being, that a browser engine is far more complex than a logger)<p>I remember a time where &quot;Scrach&quot; wasn&#x27;t a Electron application, but a native (I think?) Linux application. Obv. there can be bugs in dependencies too (rsvg, libpng, etc.) but they different and tend to not be as easily exploitable as these kind of Electron&#x2F;HTML-&gt;V8 bugs are.
评论 #31009684 未加载
评论 #31000610 未加载
xnorswapabout 3 years ago
This is one of my favourite class of vulnerabilities.<p>Many applications and saas products that deal with images are susceptible to this vector because often image handling isn&#x27;t a core business just a means to an end, so isn&#x27;t always given the priority or deference it deserves.<p>The SVG format by spec is a swiss army knife that contains all kinds of opportunities for leveraging poor handling of the data it can contain.
linspaceabout 3 years ago
How on earth?<p>&gt; The answer is perhaps surprising - SVG files can contain JavaScript, CSS and load external content<p>There you are
评论 #31000616 未加载
评论 #31000354 未加载