TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Cloudflare's Handling of an RCE Vulnerability in Cdnjs

108 点作者 sahin将近 4 年前

3 条评论

CaliforniaKarl将近 4 年前
Here’s the corresponding blog post from the researcher, describing how they discovered the vulnerability: <a href="https:&#x2F;&#x2F;blog.ryotak.me&#x2F;post&#x2F;cdnjs-remote-code-execution-en&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.ryotak.me&#x2F;post&#x2F;cdnjs-remote-code-execution-en&#x2F;</a>
azinman2将近 4 年前
I thought Docker containers weren’t meant to be secure sandboxes, but more of a convenience? It seems they did additional work but perhaps the role of the docker container has changed over time?
评论 #27944502 未加载
jpcl将近 4 年前
The comment about U+2215 being treated as a path separator seems completely unfounded to me. All info I could find mention that the path separator is hardcoded as the ASCII slash. Is there a normalization layer in Go that would convert U+2215 into a ‘&#x2F;’?