Comment by deafpolygon
1 day ago
Isn’t that nearly the same thing? It depends on the presence of a particular plugin which was abused to run remote commands.
1 day ago
Isn’t that nearly the same thing? It depends on the presence of a particular plugin which was abused to run remote commands.
No. The attack does not depend on the presence of a specific plugin. The ones listed in the article are just the ones that were used in the POC. Any plugin could be modified by the attacker if the user trusts the attacker and accepts 1. the vault, 2. the shared plugins, 3. disables restricted mode.