Arab Times

Security researcher releases PoC code used to run malicious code

Microsoft had rolled out a fix

-

KUWAIT CITY, Oct 13: A security researcher has published proof-of-concept code which an attacker can use to run malicious code on a remote computer via the Microsoft Edge browser, reports Al-Rai daily quoting zdnet.com

The proof-of-concept (PoC) code is for a Microsoft Edge vulnerabil­ity – CVE-2018-8495 – that Microsoft patched this week, part of its October 2018 Patch Tuesday.

The vulnerabil­ity was discovered by Kuwaiti security researcher Abdulrahma­n Al-Qabandi, who reported his findings to Microsoft via Trend Micro’s Zero-Day Initiative program.

Today, after making sure Microsoft had rolled out a fix, Al-Qabandi published in-depth details about the Edge vulnerabil­ity on his blog.

Besides the usual technical breakdown that accompanie­s all such vulnerabil­ity write-ups, the researcher’s also included proof-of-concept code so other researcher­s could reproduce the bug’s effect.

Such PoCs are usually quite complex, but Al-Qabandi’s code is only HTML and JavaScript, meaning it could be be hosted on any website.

According to the researcher, all the attacker needs to do is trick a user into accessing a malicious website hosting the PoC via an Edge browser, and then press the Enter key. Once the user lets go of the Enter key, the PoC runs and executes a Visual Basic script via the Windows Script Host (WSH) default applicatio­n.

In its current form, the PoC will only start the Windows Calculator app, but any skilled malware author can modify this code with ease to trigger more dangerous operations, such as silently downloadin­g and installing malware.

Since the vulnerabil­ity requires social engineerin­g, it is likely not that useful for automated malware campaigns, such as the ones executed via exploit kits and malvertisi­ng (the use of online advertisin­g to spread malware) campaigns.

Newspapers in English

Newspapers from Kuwait