6 results (0.021 seconds)

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

InstallBuilder Qt installers built with versions previous to 22.10 try to load DLLs from the installer binary parent directory when displaying popups. This may allow an attacker to plant a malicious DLL in the installer parent directory to allow executing code with the privileges of the installer (when the popup triggers the loading of the library). Exploiting these type of vulnerabilities generally require that an attacker has access to a vulnerable machine to plant the malicious DLL. Los instaladores de InstallBuilder Qt creados con versiones anteriores a la 22.10 intentan cargar archivos DLL desde el directorio principal binario del instalador cuando muestran ventanas emergentes. Esto puede permitir que un atacante coloque una DLL maliciosa en el directorio principal del instalador para permitir la ejecución de código con los privilegios del instalador (cuando la ventana emergente activa la carga de la librería). • https://blog.installbuilder.com/2022/11/installbuilder-22100-released.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers. En determinadas circunstancias, cuando se manipula el registro de Windows, InstallBuilder usa el comando de sistema reg.exe. • https://blog.installbuilder.com/2021/10/installbuilder-2160-released.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

On Windows, the uninstaller binary copies itself to a fixed temporary location, which is then executed (the originally called uninstaller exits, so it does not block the installation directory). This temporary location is not randomized and does not restrict access to Administrators only so a potential attacker could plant a binary to replace the copied binary right before it gets called, thus gaining Administrator privileges (if the original uninstaller was executed as Administrator). The vulnerability only affects Windows installers. En Windows, el binario del desinstalador se copia a sí mismo en una ubicación temporal fija, que luego es ejecutada (el desinstalador originalmente llamado sale, por lo que no bloquea el directorio de instalación). Esta ubicación temporal no es aleatoria y no restringe el acceso sólo a administradores, por lo que un potencial atacante podría plantar un binario para reemplazar el binario copiado justo antes de que sea llamado, obteniendo así privilegios de administrador (si el desinstalador original fue ejecutado como administrador). • https://blog.installbuilder.com/2021/10/installbuilder-2160-released.html • CWE-330: Use of Insufficiently Random Values •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

InstallBuilder for Qt Windows (versions prior to 20.7.0) installers look for plugins at a predictable location at initialization time, writable by non-admin users. While those plugins are not required, they are loaded if present, which could allow an attacker to plant a malicious library which could result in code execution with the security scope of the installer. Los instaladores de InstallBuilder para Qt Windows (versiones anteriores a 20.7.0) buscan plugins en una ubicación predecible en el momento de la inicialización, escribibles por usuarios no administradores. Si bien esos plugins no son requeridos, son cargados si están presentes, lo que podría permitir a un atacante plantar una biblioteca maliciosa que podría resultar en una ejecución de código con el alcance de seguridad del instalador • https://blog.installbuilder.com/2020/08/updates-and-bug-fixes-with-version-2070.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

InstallBuilder AutoUpdate tool and regular installers enabling <checkForUpdates> built with versions earlier than 19.11 are vulnerable to Billion laughs attack (denial-of-service). La herramienta InstallBuilder AutoUpdate y los instaladores regulares habilitando (checkForUpdates) compilados con versiones anteriores a la versión 19.11, son vulnerables a un ataque de tipo Billion laughs (denegación de servicio). • https://blog.installbuilder.com/2019/12/configure-autoupdate-project-settings.html • CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') •