UiPath Assistant 21.4.4 will load and execute attacker controlled data from the file path supplied to the --dev-widget argument of the URI handler for uipath-assistant://. This allows an attacker to execute code on a victim's machine or capture NTLM credentials by supplying a networked or WebDAV file path.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-30900 UiPath Assistant 21.4.4 will load and execute attacker controlled data from the file path supplied to the --dev-widget argument of the URI handler for uipath-assistant://. This allows an attacker to execute code on a victim's machine or capture NTLM credentials by supplying a networked or WebDAV file path.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T04:10:17.355Z

Reserved: 2021-11-19T00:00:00

Link: CVE-2021-44041

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-14T18:15:08.633

Modified: 2024-11-21T06:30:16.627

Link: CVE-2021-44041

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses