Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

## Language #131

Closed
Dustin4444 opened this issue Mar 8, 2025 · 1 comment
Closed

## Language #131

Dustin4444 opened this issue Mar 8, 2025 · 1 comment

Comments

@Dustin4444
Copy link

Language

Lua 🌔

Vulnerability

When accessing a table the _index method is called, this can be set to a malicious function allowing for remote code execution

Scenario

Your company sells low powered E-ink displays powered by a small embedded system. They are called E-Boards, because they are so weak they send a request to the server with the RSS feeds the user has configured; the server proceeds to generate a bitmap image and returns the request to the board which will eventually display the images to the user.

The API request looks like this:

{{source:"<link to RSS feed>", image: nil},{source:"<link to RSS feed>", image: nil}}

and it excepts the following return

{{source:"<link to RSS feed>", image: "<bitmap image>"},{source:"<link to RSS feed>", image: "<bitmap image>"}}

Unfortunately, whoever created this function forgot that metatables exist in Lua and it allows a malicious hacker to have remote code execution if one does not handle tables correctly.

Originally posted by @TheDarkThief in #125

@Dustin4444
Copy link
Author

Language

Lua 🌔

Vulnerability

When accessing a table the _index method is called, this can be set to a malicious function allowing for remote code execution

Scenario

Your company sells low powered E-ink displays powered by a small embedded system. They are called E-Boards, because they are so weak they send a request to the server with the RSS feeds the user has configured; the server proceeds to generate a bitmap image and returns the request to the board which will eventually display the images to the user.

The API request looks like this:

{{source:"", image: nil},{source:"", image: nil}}
and it excepts the following return

{{source:"", image: ""},{source:"", image: ""}}
Unfortunately, whoever created this function forgot that metatables exist in Lua and it allows a malicious hacker to have remote code execution if one does not handle tables correctly.

Originally posted by @TheDarkThief in #125

@jkcso jkcso closed this as completed Mar 9, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants