DDL injection in Acunetix - #VU6814
Published: May 30, 2017
Vulnerability identifier: #VU6814
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/U:Clear
CVE-ID: N/A
CWE-ID: CWE-427
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Acunetix
Affected software:
Acunetix
Acunetix
Detailed vulnerability description
The vulnerability allows a local attacker to execute arbitrary code on the target system.
The weakness exists due to uncontrolled search path element when loading 'python3.dll' from 'C:\DLLs\'. A local attacker can load a specially crafted DLL file from 'C:\DLLs\' and execute the file with system privileges.
Successful exploitation of the vulnerability may result in full system compromise.
The weakness exists due to uncontrolled search path element when loading 'python3.dll' from 'C:\DLLs\'. A local attacker can load a specially crafted DLL file from 'C:\DLLs\' and execute the file with system privileges.
Successful exploitation of the vulnerability may result in full system compromise.
Remediation
Update to version 11.0.170941159.