Even "cat readme.txt" is not safe
Posted by arkadiyt 3 hours ago
Comments
Comment by KerrickStaley 55 minutes ago
Why was this disclosed before the hole was patched in the stable release?
It's only been 18 days since the bug was reported to upstream, which is much shorter than typical vulnerability disclosure deadlines. The upstream commit (https://github.com/gnachman/iTerm2/commit/a9e745993c2e2cbb30...) has way less information than this blog post, so I think releasing this blog post now materially increases the chance that this will be exploited in the wild.
Update: The author was able to develop an exploit by prompting an LLM with just the upstream commit, but I still think this blog post raises the visibility of the vulnerability.
Comment by ezoe 14 minutes ago
If publicly accessible AI model with very cheap fee can find it, it's very natural to assume the attackers had found it already by the same method.
Comment by CodesInChaos 47 minutes ago
Like why doesn't `println` in a modern language like rust auto-escape output to a terminal, and require a special `TerminalStr` to output a raw string.
Comment by im3w1l 32 minutes ago
Consider cat. It's short for concatenate. It concatenates the files based to it as arguments and writes them to stdout, that may or may not be redirected to a file. If it didn't pass along terminal escapes, it would fail at its job of accurate concatenation.
Now I don't mean to dismiss your idea, I do think you are on the right track. The question is just how to do this cleanly given the very entrenched assumptions that lead us where we are.
Comment by TZubiri 40 minutes ago
Comment by ButlerianJihad 37 minutes ago
Comment by Bender 2 hours ago
alias cat
cat='strings -a --unicode=hex'Comment by halJordan 57 minutes ago
Comment by Bender 51 minutes ago
Comment by holoduke 23 minutes ago