Description
In AppSpider installer versions prior to 7.2.126, the AppSpider installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during an installation and any arbitrary code executable using the same file name.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-28485 | In AppSpider installer versions prior to 7.2.126, the AppSpider installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during an installation and any arbitrary code executable using the same file name. |
References
History
No history.
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2024-08-04T09:25:48.976Z
Reserved: 2020-01-21T00:00:00.000Z
Link: CVE-2020-7358
No data.
Status : Modified
Published: 2020-09-18T15:15:13.827
Modified: 2024-11-21T05:37:06.747
Link: CVE-2020-7358
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD