cve/2022/CVE-2022-2313.md

19 lines
959 B
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-2313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2313)
![](https://img.shields.io/static/v1?label=Product&message=Trellix%20Agent%20(TA)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%205.7.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-%20427%3A%20Uncontrolled%20Search%20Path%20Element&color=brighgreen)
### Description
A DLL hijacking vulnerability in the MA Smart Installer for Windows prior to 5.7.7, which allows local users to execute arbitrary code and obtain higher privileges via careful placement of a malicious DLL into the folder from where the Smart installer is being executed.
### POC
#### Reference
- https://kcm.trellix.com/corporate/index?page=content&id=SB10385&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ExpLangcn/FuYao-Go