834
Oops, wrong person. (lemmy.world)
you are viewing a single comment's thread
view the rest of the comments
[-] MyFeetOwnMySoul@lemmy.ca 43 points 11 months ago

How does this exploit work? I understand that inputs were not sanitized, but what did the injected code do?

[-] powerofm@lemmy.ca 69 points 11 months ago

My guess would be the response text is passed through a rudimentary templating engine that looks for { and }. Somehow it must be processing the whole chat history. The templater fails at the unexpected braces in the code block and then just gives up (probably a try-catch ignores the error and sends the message anyway).

[-] mumblerfish@lemmy.world 38 points 11 months ago

So the attack would just be a } then?

[-] kromem@lemmy.world 47 points 11 months ago* (last edited 11 months ago)

I don't think the code is doing anything, it looks like it might be the brackets.

That effectively the spam script has like a greedy template matcher that is trying to template the user message with the brackets and either (a) chokes on an exception so that the rest is spit out with no templating processor, or (b) completes so that it doesn't apply templating to the other side of the conversation.

So { a :'b'} might work instead.

this post was submitted on 02 Jan 2024
834 points (99.4% liked)

Programmer Humor

32707 readers
494 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS