Description
In AppSpider installer versions prior to 7.2.126, the AppSpider installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during an installation and any arbitrary code executable using the same file name.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-28485 | In AppSpider installer versions prior to 7.2.126, the AppSpider installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during an installation and any arbitrary code executable using the same file name. |
References
History
No history.
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2024-08-04T09:25:48.976Z
Reserved: 2020-01-21T00:00:00.000Z
Link: CVE-2020-7358
No data.
Status : Modified
Published: 2020-09-18T15:15:13.827
Modified: 2024-11-21T05:37:06.747
Link: CVE-2020-7358
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD