June 11, 2024, 1:41 p.m. |

Packet Storm packetstormsecurity.com

VSCode when opening a Jupyter notebook (.ipynb) file bypasses the trust model. On versions v1.4.0 through v1.71.1, its possible for the Jupyter notebook to embed HTML and javascript, which can then open new terminal windows within VSCode. Each of these new windows can then execute arbitrary code at startup. During testing, the first open of the Jupyter notebook resulted in pop-ups displaying errors of unable to find the payload exe file. The second attempt at opening the Jupyter …

arbitrary code can code code execution file html javascript jupyter jupyter notebook notebook remote code remote code execution startup terminal testing trust vscode windows

Senior Software Java Developer

@ Swiss Re | Madrid, M, ES

Product Owner (Hybrid) - 19646

@ HII | Fort Belvoir, VA, Virginia, United States

Sr. Operations Research Analyst

@ HII | Albuquerque, NM, New Mexico, United States

Lead SME Platform Architect

@ General Dynamics Information Technology | USA VA Falls Church - 3150 Fairview Park Dr (VAS095)

DevOps Engineer (Hybrid) - 19526

@ HII | San Antonio, TX, Texas, United States

Cloud Platform Engineer (Hybrid) - 19535

@ HII | Greer, SC, South Carolina, United States