logoalt Hacker News

skybrianyesterday at 5:00 PM2 repliesview on HN

How does the attacker supply a malicious schema? Can that be turned off? It doesn't seem like a normal thing to do.


Replies

radicalityyesterday at 6:16 PM

I think something like this: Imagine a tool for querying remote grpc endpoints - you would point at some endpoint to query it / explore it, and the tool would request the proto schema files from a potentially untrusted source - something you would not expect to be that unsafe and trigger an rce.

cyanydeezyesterday at 5:08 PM

probably via normal npm injection server side.

show 1 reply