Submitted via IRC for SoyCow8317
Research presented this week at the Black Hat Europe 2017 security conference has revealed that several popular interpreted programming languages are affected by severe vulnerabilities that expose apps built on these languages to attacks.
The author of this research is IOActive Senior Security Consultant Fernando Arnaboldi. The expert says he used an automated software testing technique named fuzzing to identify vulnerabilities in the interpreters of five of today's most popular programming languages: JavaScript, Perl, PHP, Python, and Ruby.
[...] The researcher released XDiFF as an open source project on GitHub. A more detailed presentation of the testing procedure and all the vulnerabilities is available in Arnaboldi's research paper named "Exposing Hidden Exploitable Behaviors in Programming Languages Using Differential Fuzzing."
(Score: 0) by Anonymous Coward on Tuesday December 12 2017, @09:23PM (2 children)
They aren't really huge exploits and most of this is overhyped. For example, one of the Python vulnerabilities requires changing the environment the program is in so that the PAGER variable points somewhere else. Hate to break it to you, but if you can change the pager, you can do a lot more than hope that the python script running eventually uses the specific method that relies on that.
(Score: 0) by Anonymous Coward on Tuesday December 12 2017, @09:37PM (1 child)
Well, that's a bit of a permission-upgrade possibility, one must grant.
(Score: 0) by Anonymous Coward on Wednesday December 13 2017, @02:54AM
No more so than the ability to change the environmental variable of a running process from the outside. To do so requires external debugging permission, which is (on most modern systems) either the same user or root. Root is, obviously, not in need of an upgrade, and the same user can already run the program directly without having to go to the trouble of making another process do it for them.