TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Telegram Remote Code Execution Zero-Day Vulnerability

43 点作者 geektips超过 7 年前

6 条评论

wizzard0超过 7 年前
Calling it &quot;remote code execution&quot; is veeeery clickbait-y. By this logic, any website with download links uses &quot;remote code execution&quot;.<p>Even the source article says just &quot;zero-day&quot;.<p>Also, tldr: Using Unicode Right-To-Left, you can make Telegram show file name &quot;gpj.js&quot; as &quot;sj.jpg&quot;. That&#x27;s all.
评论 #16367423 未加载
评论 #16367493 未加载
评论 #16367877 未加载
评论 #16367905 未加载
评论 #16367678 未加载
dsacco超过 7 年前
This article is atrocious. It has a clear agenda motivating its publication that is simply at odds with facts.<p>1. This is not a vulnerability with Telegram. The headline is deliberate clickbait, and the article’s Telegram-centric presentation doesn’t redeem it.<p>2. This is not a remote code exeution vulnerability, or even a “0-day” (for whatever meaning that term still has...). This vulnerability is a malicious file upload combined with a clever phishing vector.<p>The reporting is <i>exceptionally</i> bad - so much so that it is difficult for me to attribute it to simple ignorance. It is very clearly trying to hit several checkboxes for what is otherwise a non-story:<p>* Telegram<p>* Cybercrime<p>* Cryptocurrencies&#x2F;Mining<p>The entire narrative is carefully constructed with keywords that have no hard relation to the vulnerability <i>whatsoever</i> - it feels like I’m reading a bug bounty report where someone extrapolates a minor endpoint security or phishing vulnerability to whatever they think will get the most attention to the report.<p>Reporting like this almost makes me wish for Gell-Mann Amnesia in my own field.
ptico超过 7 年前
&quot;Hello! I&#x27;m russian remote code execution vulnerability, please run me and ignore system security warning. Also, you may want to delete your Documents and Settings folder, just press Del button and then Continue&quot;
评论 #16367511 未加载
评论 #16367468 未加载
ejcx超过 7 年前
This should be renamed to &quot;Telegram right to left vulnerability&quot;<p>This is just not an RCE. It&#x27;s just pretty good phishing.
syx超过 7 年前
I didn&#x27;t quite understand the &quot;Remote control&quot; scenario; is the victim becoming a telegram bot, where the attacker sends commands to the bot and the bot executes stuff on the victim system?
评论 #16367750 未加载
badwebsite超过 7 年前
Mods need to change the title -- this is deliberately dishonest reporting as it stands.