cve/2022/CVE-2022-2313.md

20 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-2313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2313)
![](https://img.shields.io/static/v1?label=Product&message=Trellix%20Agent%20(TA)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%205.7.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-%20427%3A%20Uncontrolled%20Search%20Path%20Element&color=brighgreen)
### Description
A DLL hijacking vulnerability in the MA Smart Installer for Windows prior to 5.7.7, which allows local users to execute arbitrary code and obtain higher privileges via careful placement of a malicious DLL into the folder from where the Smart installer is being executed.
### POC
#### Reference
- https://kcm.trellix.com/corporate/index?page=content&id=SB10385&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US
2024-06-09 00:33:16 +00:00
- https://kcm.trellix.com/corporate/index?page=content&id=SB10385&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ExpLangcn/FuYao-Go