#VU64002 Security features bypass in qDecoder


Vulnerability identifier: #VU64002

Vulnerability risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-32265

CWE-ID: CWE-254

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
qDecoder
Universal components / Libraries / Libraries used by multiple products

Vendor: wolkykim

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected application does not ensure the percent character is followed by two hex digits for URL decoding. A remote attacker can launch further attacks on the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

qDecoder: 12.0.0 - 12.0.8


External links
http://github.com/wolkykim/qdecoder/pull/29/commits/ce7c8a7ac450a823a11b06508ef1eb7441241f81#diff-1c4e2f5adfa1ad30618e78ff459b2c0758ecf34278459ad0a8d58db4fec622ea
http://github.com/wolkykim/qdecoder/pull/29
http://github.com/wolkykim/qdecoder/releases/tag/v12.1.0


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability