Remix.run Logo
42lux 6 days ago

Edit: Was not supposed to create a flamewar about semantics...

saberience 5 days ago | parent | next [-]

If that's your definition then most of modern software is an RCE. Mac OSX is also an RCE, so is Windows 11, Chrome etc.

5 days ago | parent [-]
[deleted]
cluckindan 6 days ago | parent | prev | next [-]

It’s not an RCE, it is a supply chain attack.

freedomben 6 days ago | parent [-]

It's an RCE delivered via supply chain attack

djent 5 days ago | parent [-]

malware isn't remote. therefore it isn't remote code execution

freedomben 5 days ago | parent [-]

If you can execute code on some machine without having access to that machine, then it's RCE. Whether you gain RCE through an exploit in a bad network protocol or through tricking the user into running your code (i.e. this attack) is merely a delivery mechanism. It's still RCE

cluckindan 5 days ago | parent [-]

Not exactly. A supply chain attack can be used to deliver RCE enabling payloads such as a reverse shell, but in itself, it is not considered RCE.

RCE implies ability to remotely execute arbitrary code on an affected system at will.

freedomben 5 days ago | parent [-]

> A supply chain attack can be used to deliver RCE enabling payloads such as a reverse shell, but in itself, it is not considered RCE.

Yes, as I tried to make clear above, these are orthogonal. The supply chain attack is NOT an RCE, it's a delivery mechanism. The RCE is the execution of the attacker's code, regardless how it got there.

> RCE implies ability to remotely execute arbitrary code on an affected system at will.

We'll have to disagree on this one, unless one of us can cite a definition from a source we can agree on. Yes frequently RCE is something an attacker can push without requiring the user to do something, but I don't think that changes the nature of the fact that you are achieving remote code execution. Whether the user triggers the execution of your code by `npm install`ing your infected package or whether the attacker triggers it by sending an exploitative packet to a vulnerable network service isn't a big enough nuance in my opinion to make it not be RCE. From that perspective, the user had to start the vulnerable service in the first place, or even turn the computer on, so it still requires some user (not the attacker) action before it's vulnerable.

cluckindan 5 days ago | parent [-]

https://www.sciencedirect.com/topics/computer-science/remote...

divan 6 days ago | parent | prev [-]

Ah, I didn't know that claude code has headless mode...