URL has been copied successfully!
Cursor’s autorun lets hackers execute arbitrary code
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Cursor’s autorun lets hackers execute arbitrary code

Security Debt in the Cursor Ecosystem: The disclosure isn’t an isolated scenario. Earlier this year, Cursor was already targeted by campaigns like CurXecute and MCPoison, along with npm package tampering aimed at macOS users. Barr warned that the .vscode/tasks.json issue is “just another piece of the same puzzle: attackers are looking deep into Cursor’s ecosystem to uncover any pathway to execution.”Cursor did not immediately respond to CSO’s request for comments.Hinting at a silver lining, Ford said, “Cursor is at the point where they’re being compared to (and increasingly targeted like) Microsoft’s Visual Studio. This is a cause for a high-five and a reckoning to further harden and expand enterprise security capabilities.” To mitigate the issue, Oasis researchers advise enabling Workspace Trust and taking extra care with unknown repositoriessuch as opening them elsewhere, reviewing them first, and limiting exposed secrets.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/4054796/cursors-autorun-lets-hackers-execute-arbitrary-code.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link