The test suite includes a function named testPwned, which executes arbitrary commands on the user's machine.
This presents a significant security risk, as such commands could potentially extract sensitive data, establish a reverse shell for remote control, search for passwords, or install malware.
This is the malicious test, it looks inoffensive as it just create a file called youve-been-pwned
but there is no underlying reason for this test to be here except a malicious behavior.
A more alarming scenario is demonstrated in the following proof of concept, where the user's API key could be compromised:.
First export the api key in your shell
Then execute the test to store the API key in a file:
Alternatively, transmit it to an external server:
Other interesting POC that qualify this issue as a HIGH
This POC demonstrates how a test could open a reverse shell, allowing an attacker to gain control over the user's machine.
This POC shows how a test could find specific files (starting with "pass" ) and send the results to a remote server.
This POC demonstrates a highly destructive command that could potentially erase all data on the user's root filesystem.
This issue is categorized as HIGH due to the direct risk it poses to funds and sensitive information.
The test, as it stands, is harmful, as it is used in a security contexts but i assume that the general purpose of this functionality is to be harmfull.
It could lead to data breaches (including private keys and passwords), unauthorized remote code execution, and the potential destruction of digital information (e.g., rm -rf /).
forge test 😅
Always exercise caution before running third-party programs on your system.
Ensure you understand the functionality of any command or script to prevent unintended consequences, especially those involving security vulnerabilities.
The FFI variable within Foundry.TOML was set to TRUE. This variable gives foundry shell access and allows it to run commands on your terminal. The possibility of exploitation through this means are endless! This repo exploited this flag through test_pwned Keep an eye out before running tests!
The FFI variable within Foundry.TOML was set to TRUE. This variable gives foundry shell access and allows it to run commands on your terminal. The possibility of exploitation through this means are endless! This repo exploited this flag through test_pwned Keep an eye out before running tests!
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.