/VSCode_CodeExecution_WindowsPoC

Proof of Concept for a VSCode Python Extension Code Execution Vulnerability

Primary LanguagePython

VSCode Python Extension Code Execution

Adapted to be working on Windows, original by doyensec.

This repository contains the Proof-of-Concept of a code execution vulnerability discovered in the Visual Studio Code Python extension.

TL;DR: VScode may use code from a virtualenv found in the project folders without asking the user, for things such as formatting, autocompletion, etc. This insecure design leads to arbitrary code execution by simply cloning and opening a malicious Python repository.

You can read more about this vulnerability on our blog: https://blog.doyensec.com/2020/03/16/vscode_codeexec.html.

HowTo

  • Clone the 'malicious' repository with git clone https://github.com/ErbaZZ/VSCode_CodeExecution_WindowsPoC
  • Add the cloned repo to a VSCode workspace (Working on Windows)
  • Open main.py in VScode