VegaBird Yaazhini 2.0.2 DLL Hijacking
2024-10-1 05:46:42 Author: cxsecurity.com(查看原文) 阅读量:7 收藏

==================================== CVE ID: CVE-2024-45873 Author: Iulian Florea Vendor: VegaBird Product: Vooki - Free Android APK & API Vulnerability Scanner(Yaazhini) Vulnerability Type: DLL Hijacking ==================================== ==================================== Summary ==================================== A DLL hijacking vulnerability in VegaBird Yaazhini 2.0.2 allows attackers to execute arbitrary code / maintain persistence via placing a crafted DLL file in the same directory as Yaazhini.exe. ==================================== Exploitation ==================================== By placing an arbitrary DLL (Example: dcomp.dll) within the application folder (C:\Users\<USER>\AppData\Local\Programs\Yaazhini) and opening the application (Yaazhini.exe) it can be noted that the DLL is being loaded. This can lead to persistence or in some cases to privilege escalation.


文章来源: https://cxsecurity.com/issue/WLB-2024090052
如有侵权请联系:admin#unsafe.sh