cve/2016/CVE-2016-10717.md

21 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-10717](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10717)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A vulnerability in the encryption and permission implementation of Malwarebytes Anti-Malware consumer version 2.2.1 and prior (fixed in 3.0.4) allows an attacker to take control of the whitelisting feature (exclusions.dat under %SYSTEMDRIVE%\ProgramData) to permit execution of unauthorized applications including malware and malicious websites. Files blacklisted by Malwarebytes Malware Protect can be executed, and domains blacklisted by Malwarebytes Web Protect can be reached through HTTP.
### POC
#### Reference
- https://forums.malwarebytes.com/topic/158251-malwarebytes-hall-of-fame/
- https://github.com/mspaling/mbam-exclusions-poc-
- https://github.com/mspaling/mbam-exclusions-poc-/blob/master/mbam-whitelist-poc.txt
- https://www.youtube.com/watch?v=LF5ic5nOoUY
#### Github
No PoCs found on GitHub currently.