This also works with Chromium on Debian GNU/Linux.
Interesting... since Chromium can be run on a Raspberry Pi, does that mean a Pi can be used for Skype now?
They inject code right into the script that already has the execute bit set. It's not uncommon, I've seen it myself.
Looking at this specific example, WP Mobile Detector flaw, I can't see how that would be possible.
Just to recap (mostly for my own benefit to make sure I'm not going mad!), this flaw works by sending a URL to a vulnerable website. The vulnerable website then uses file_get_contents() to read the file... it is assuming the file is local, but actually it's a URL to somewhere else. If the server is configured with allow_url_fopen then file_get_contents() will perform the necessary HTTP GET to retrieve the contents of that file. The file still needs to be written to disk, which in this case is performed by file_put_contents().
None of the above is going to set the execute bit.
This doesn't help anything because the script they inject the code into already has the execute bit set.
They're not uploading the script using SFTP or anything that might preserve file permissions; they're uploading using an existing, insecure, PHP script on the server. That will only allow for the file content and the file name to be preserved, so unless the PHP script explicitly set the file as executable, then it wouldn't be executable. The problem is, right now, it doesn't need to be executable in order to execute!
Windows 10 is a gift to the Linux world.
Only on Slashdot.
To the rest of the U.S., at least, Windows 10 was a gift to the OS X world.
I wonder if it is OS X or Chrome OS that will gain the most?
You can not get anything worthwhile done without raising a sweat. -- The First Law Of Thermodynamics