Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Tabby: RCE via `tabby://run` URL Scheme
Vulnerability Description
Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.233, Tabby registers itself as the handler for the tabby:// URL scheme on all platforms. The URL scheme handler supports a run command that directly executes OS commands with no user confirmation, sanitization, or sandboxing. An attacker can craft a malicious link (tabby://run?command=...) and deliver it via a website, email, chat message, or any other medium. When a victim clicks the link, the OS launches Tabby which immediately spawns the specified command as a child process with the user's full privileges. This is a zero-click-after-link-visit RCE vulnerability. This vulnerability is fixed in 1.0.233.
CVSS Information
N/A
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
Tabby 操作系统命令注入漏洞
Vulnerability Description
Tabby(Terminus)是Eugene个人开发者的一个适用于 Windows 10、macOS 和 Linux 的高度可配置的终端仿真器、SSH 和串行客户端。 Tabby(Terminus) 1.0.233之前版本存在操作系统命令注入漏洞,该漏洞源于tabby:// URL方案处理程序直接执行OS命令且无用户确认,可能导致攻击者通过恶意链接实现远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A