支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 7597dd8cabf6ad3c68a200a1b5827864bbd8f6e0

来源
关联漏洞
标题:Microsoft GitHub Copilot and Visual Studio 命令注入漏洞 (CVE-2025-53773)
Description:Microsoft GitHub Copilot and Visual Studio是美国微软(Microsoft)公司的一种生成式 AI 工具。 Microsoft GitHub Copilot and Visual Studio存在命令注入漏洞。攻击者利用该漏洞可以执行代码。
Description
CVE-2025-53773 
介绍
# 💥 CVE-2025-53773 — Remote Code Execution in GitHub Copilot 💥

📅 Released: Aug 12 2025
🏢 Vendor: Microsoft / GitHub
⚠️ Severity: **High** (CVSS 7.8)
🔍 Weakness: CWE-77 — Command Injection
🎯 Impact: Prompt injection → Config abuse → Instant RCE

---


### 🧩 Attack Chain

📜 Sneaky Prompt Injection
 Attacker hides malicious instructions inside a repo file, comment, or README.
🤖 Copilot “reads” the prompt as a command for itself.

⚙️ YOLO Mode Activated
📝 Copilot edits its own `config.json` to enable a *YOLO mode* flag.
🚫 Disables **all** safety approvals.

💣 **Instant Code Execution**
📥 Copilot suggests dangerous code (e.g., `rm -rf /`, `os.system(...)`).
💻 Runs **immediately**, no questions asked.

🎯 **Full Compromise**
🛠 Executes with your VS privileges (often full dev access, sometimes admin).
🔑 Possible access to your files, tokens, and networks.


<img width="1440" height="778" alt="vscode-documentation-settings-json" src="https://github.com/user-attachments/assets/81680ff9-62ed-4a63-bf9e-a33fe35e43b4" />


---

### 🚨 Why It’s Dangerous

* **🙈 Invisible:** Looks like normal AI suggestions.
* **🛠 No Privileges Needed:** Works on a fresh user account.
* **📦 Supply Chain Risk:** Any repo with the crafted prompt can hit *all* devs who open it.

---

### 🛡 Mitigation Steps

* **Update** GitHub Copilot extension & Visual Studio (patch out now).
* **🔍 Check config file:**

  * **Windows:** `%AppData%\GitHub Copilot\config.json`
  * **Linux/macOS:** `~/.config/github-copilot/config.json`
  * Look for `"yolo_mode": true` or unknown settings.
* **♻ Reset Copilot settings** & re-enable approval prompts.
* **👀 Audit recent AI-generated code** for suspicious shell/system calls.


<img width="3812" height="2108" alt="copilot-chat-result" src="https://github.com/user-attachments/assets/a072d761-9e5f-4fb6-aeab-4007c949fd8b" />

---

### 🕵️ Detection Ideas

* 📂 Watch for unexpected writes to Copilot’s `config.json`.
* 🖥 Alert if Visual Studio spawns shells (`cmd.exe`, `powershell.exe`, `/bin/sh`).
* 🧮 Scan Copilot suggestions for obfuscated or encoded commands.

---

文件快照

[4.0K] /data/pocs/7597dd8cabf6ad3c68a200a1b5827864bbd8f6e0 ├── [ 0] hello.c └── [2.2K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。