Uncontrolled Search Path Element Remote Code Execution Vulnerability
CVE-2023-44439
7.8HIGH
Key Information:
- Vendor
- Ashlar-vellum
- Status
- Xenon
- Vendor
- CVE Published:
- 3 May 2024
Summary
The vulnerability arises from the improper handling of various file types by Ashlar-Vellum Xenon, which allows the software to load libraries from unsecured locations. This flaw presents a significant risk, as it enables remote attackers to execute arbitrary code within the current process context. Exploitation of this vulnerability necessitates user interaction, requiring the target to either access a malicious webpage or open a compromised file. This issue underscores the importance of securing library paths and addressing vulnerabilities that necessitate user input for successful exploitation.
Affected Version(s)
Xenon Xenon v12 Beta Build 1204.68
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved