Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade PanelSW.Custom.WiX
to version 3.15.0-a44 or higher.
Affected versions of this package are vulnerable to Untrusted Search Path due to the imp[roper handling of the .be TEMP
folder. An attacker can escalate privileges by monitoring the user's TEMP folder for changes and inserting a malicious DLL into the .be/.Local
folder immediately when the .be
folder is created. When the burn engine elevates, the malicious DLL is executed with elevated privileges.
Note:
This is only exploitable if the bundle is not run as admin, thus using the user's TEMP folder instead of the system TEMP folder.