mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 18:52:12 +00:00
24 lines
1.2 KiB
Markdown
24 lines
1.2 KiB
Markdown
![]() |
### [CVE-2021-44226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44226)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Razer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\Razer\Synapse3\Service\bin even if %PROGRAMDATA%\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/166485/Razer-Synapse-3.6.x-DLL-Hijacking.html
|
||
|
- http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html
|
||
|
- http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html
|
||
|
- http://seclists.org/fulldisclosure/2022/Mar/51
|
||
|
- http://seclists.org/fulldisclosure/2023/Jan/26
|
||
|
- http://seclists.org/fulldisclosure/2023/Sep/6
|
||
|
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-058.txt
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
|