Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4ghh-j426-rf97

Опубликовано: 08 окт. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

Panini Everest Engine 2.0.4 allows unprivileged users to create a file named Everest.exe in the %PROGRAMDATA%\Panini folder. This leads to privilege escalation because a service, running as SYSTEM, uses the unquoted path of %PROGRAMDATA%\Panini\Everest Engine\EverestEngine.exe and therefore a Trojan horse %PROGRAMDATA%\Panini\Everest.exe may be executed instead of the intended vendor-supplied EverestEngine.exe file.

Panini Everest Engine 2.0.4 allows unprivileged users to create a file named Everest.exe in the %PROGRAMDATA%\Panini folder. This leads to privilege escalation because a service, running as SYSTEM, uses the unquoted path of %PROGRAMDATA%\Panini\Everest Engine\EverestEngine.exe and therefore a Trojan horse %PROGRAMDATA%\Panini\Everest.exe may be executed instead of the intended vendor-supplied EverestEngine.exe file.

EPSS

Процентиль: 68%
0.00575
Низкий

7.8 High

CVSS3

Дефекты

CWE-428

Связанные уязвимости

CVSS3: 7.8
nvd
больше 3 лет назад

Panini Everest Engine 2.0.4 allows unprivileged users to create a file named Everest.exe in the %PROGRAMDATA%\Panini folder. This leads to privilege escalation because a service, running as SYSTEM, uses the unquoted path of %PROGRAMDATA%\Panini\Everest Engine\EverestEngine.exe and therefore a Trojan horse %PROGRAMDATA%\Panini\Everest.exe may be executed instead of the intended vendor-supplied EverestEngine.exe file.

EPSS

Процентиль: 68%
0.00575
Низкий

7.8 High

CVSS3

Дефекты

CWE-428