Untrusted Search Path Affecting panelsw.custom.wix package, versions [,3.15.0-a44)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.05% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DOTNET-PANELSWCUSTOMWIX-6241892
  • published12 Feb 2024
  • disclosed8 Feb 2024
  • creditUnknown

Introduced: 8 Feb 2024

CVE-2024-24810  (opens in a new tab)
CWE-426  (opens in a new tab)

How to fix?

Upgrade PanelSW.Custom.WiX to version 3.15.0-a44 or higher.

Overview

Affected versions of this package are vulnerable to Untrusted Search Path due to the imp[roper handling of the .be TEMP folder. An attacker can escalate privileges by monitoring the user's TEMP folder for changes and inserting a malicious DLL into the .be/.Local folder immediately when the .be folder is created. When the burn engine elevates, the malicious DLL is executed with elevated privileges.

Note:

This is only exploitable if the bundle is not run as admin, thus using the user's TEMP folder instead of the system TEMP folder.

References

CVSS Scores

version 3.1