Skip to content

Conversation

@ex0dus-0x
Copy link
Contributor

@ex0dus-0x ex0dus-0x commented Dec 17, 2025

This a multi-language query that attempts to model CVE-2022-43550 for desktop apps that employ protocol handling on untrusted URLs through a variety of mechanisms. If no sanitization/guards are introduced, then links with arbitrary protocols (eg. smb:// and some-custom-vuln-handler://) can be supplied to trigger unintended actions against a user that clicks.

Languages and frameworks supported:

  • C/C++
    • Generic shell invoction through rundll32 url.dll,FileProtocolHandler, xdg-open and open for their respective platforms
    • Qt's QDesktopServices::openUrl
  • Java
    • Generic sell invocation
    • Desktop.browse()

@ex0dus-0x ex0dus-0x changed the title Add PotentiallyUnguardedProtocolHandler query for Java Add PotentiallyUnguardedProtocolHandler query for Java and C++ Dec 17, 2025
@ex0dus-0x ex0dus-0x force-pushed the alan/untrusted-protocol-handle branch from c3d12d8 to 3275b0d Compare January 2, 2026 17:49
@ex0dus-0x ex0dus-0x marked this pull request as ready for review January 8, 2026 14:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants