关联漏洞
Description
CVE-2025-53773
介绍
# 💥 CVE-2025-53773 — Remote Code Execution in GitHub Copilot 💥
📅 Released: Aug 12 2025
🏢 Vendor: Microsoft / GitHub
⚠️ Severity: **High** (CVSS 7.8)
🔍 Weakness: CWE-77 — Command Injection
🎯 Impact: Prompt injection → Config abuse → Instant RCE
---
### 🧩 Attack Chain
📜 Sneaky Prompt Injection
Attacker hides malicious instructions inside a repo file, comment, or README.
🤖 Copilot “reads” the prompt as a command for itself.
⚙️ YOLO Mode Activated
📝 Copilot edits its own `config.json` to enable a *YOLO mode* flag.
🚫 Disables **all** safety approvals.
💣 **Instant Code Execution**
📥 Copilot suggests dangerous code (e.g., `rm -rf /`, `os.system(...)`).
💻 Runs **immediately**, no questions asked.
🎯 **Full Compromise**
🛠 Executes with your VS privileges (often full dev access, sometimes admin).
🔑 Possible access to your files, tokens, and networks.
<img width="1440" height="778" alt="vscode-documentation-settings-json" src="https://github.com/user-attachments/assets/81680ff9-62ed-4a63-bf9e-a33fe35e43b4" />
---
### 🚨 Why It’s Dangerous
* **🙈 Invisible:** Looks like normal AI suggestions.
* **🛠 No Privileges Needed:** Works on a fresh user account.
* **📦 Supply Chain Risk:** Any repo with the crafted prompt can hit *all* devs who open it.
---
### 🛡 Mitigation Steps
* **Update** GitHub Copilot extension & Visual Studio (patch out now).
* **🔍 Check config file:**
* **Windows:** `%AppData%\GitHub Copilot\config.json`
* **Linux/macOS:** `~/.config/github-copilot/config.json`
* Look for `"yolo_mode": true` or unknown settings.
* **♻ Reset Copilot settings** & re-enable approval prompts.
* **👀 Audit recent AI-generated code** for suspicious shell/system calls.
<img width="3812" height="2108" alt="copilot-chat-result" src="https://github.com/user-attachments/assets/a072d761-9e5f-4fb6-aeab-4007c949fd8b" />
---
### 🕵️ Detection Ideas
* 📂 Watch for unexpected writes to Copilot’s `config.json`.
* 🖥 Alert if Visual Studio spawns shells (`cmd.exe`, `powershell.exe`, `/bin/sh`).
* 🧮 Scan Copilot suggestions for obfuscated or encoded commands.
---
文件快照
[4.0K] /data/pocs/7597dd8cabf6ad3c68a200a1b5827864bbd8f6e0
├── [ 0] hello.c
└── [2.2K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。