Plugins on well-known editing tools can give hackers priority
These tools are often extended with third-party plugins, but they often bring unpredictable dangers.
Whether a programmer or a writer, an editor always helps you work more effectively in a digital environment. For example, Sublime is used by many users due to its useful syntax highlighting and auto-complete tools.
These tools are often extended with third-party plugins. But these plugins often bring unpredictable dangers, even though plugins of familiar tools like Wordpress or Chrome.
Researcher at SafeBreach Dor Azouri analyzed some of the famous editing tools on Unix systems, Linux such as Sublime, Vim, Emacs, Gedit and pico / nano. Except for pico / nano, all have vulnerabilities that can help attackers escalate privileges and run malicious code.
Plugin from 3rd party is always hidden many dangers
This error lies in the stage when these tools download the plugin. Accordingly, the division of normal and escalating modes is not appropriately divided. The integrity of directory access is not preserved, so it is open to attackers with normal access to escalate privileges and run malicious code.
A simple malicious advertising campaign can help spread, run malicious code, install malware and completely control remote victim machines. Azouri recommends using open source host intrusion detection system named OSSEC to monitor system activity, logs, processes .
Users should avoid downloading 3rd party plugins while in Elevated mode and deny access to unprivileged users. Directory permissions, files should also be clearly divided between the two modes.
See more:
- WordPress plugins with more than 300,000 pages that use vulnerabilities are vulnerable to SQL Injection attacks
- How to remove and disable Plug-ins in the browser?
- Visual Studio Code now has an extremely useful color picker
You should read it
- 10 tips for Microsoft's cross-platform code editing tool - Visual Studio Code
- 6 best code editor apps for Mac
- Detects code execution vulnerabilities in WinRAR, noting more than 100 infringement cases
- More than 40 Windows drivers contain dangerous privilege escalation vulnerabilities
- Instructions for installing Sublime Text
- ProFTPD remote code execution vulnerability affects more than 1 million servers worldwide
- 10 best free HTML editing tools for Windows 2018
- What is Sublime Text? Why do developers often use Sublime Text
- 5 free online HTML editing tools that test the best code
- Adblock Plus filter can be exploited to run malicious code
- Adobe Flash Player has a serious zero-day vulnerability
- Free online photo editing services should not be missed!
Maybe you are interested
Ways technology can keep you safe and healthy on the go How to use Wget to download files on Linux Dell Latitude 9510 officially launched: 5G support, up to 30 hours of battery life How to download all photo albums on Facebook to Android phones Latest features of Microsoft Office 2019 Instructions to download all photo albums on Facebook