PeaZip 9.4.0 Library dragdropfilesdll.dll uncontrolled search path
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.1 | $0-$5k | 0.12 |
Summary
A vulnerability was found in PeaZip 9.4.0 and classified as problematic. Affected by this issue is some unknown functionality in the library dragdropfilesdll.dll of the component Library Handler. The manipulation leads to uncontrolled search path. This vulnerability is handled as CVE-2023-6891. Local access is required to approach this attack. There is no exploit available. It is recommended to upgrade the affected component. Vendor was contacted early, confirmed the existence of the flaw and immediately worked on a patched release. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Details
A vulnerability has been found in PeaZip 9.4.0 and classified as problematic. Affected by this vulnerability is an unknown part in the library dragdropfilesdll.dll of the component Library Handler. The manipulation with an unknown input leads to a uncontrolled search path vulnerability. The CWE definition for the vulnerability is CWE-427. The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was released 12/16/2023. It is possible to read the advisory at peazip.github.io. This vulnerability is known as CVE-2023-6891. Technical details of the vulnerability are known, but there is no available exploit. The attack technique deployed by this issue is T1574 according to MITRE ATT&CK.
Vendor was contacted early, confirmed the existence of the flaw and immediately worked on a patched release.
Upgrading to version 9.6.0 eliminates this vulnerability. The upgrade is hosted for download at peazip.github.io. The advisory contains the following remark:
This release also improves the ability to self-check the integrity of its binaries, including also libraries (.dll, .so, etc) and sfx modules.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.1VulDB Meta Temp Score: 6.1
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.8
NVD Vector: 🔍
CNA Base Score: 5.3
CNA Vector (VulDB): 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Uncontrolled search pathCWE: CWE-427 / CWE-426
CAPEC: 🔍
ATT&CK: 🔍
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: PeaZip 9.6.0
Timeline
12/16/2023 🔍12/16/2023 🔍
12/16/2023 🔍
01/11/2024 🔍
Sources
Advisory: peazip.github.ioStatus: Confirmed
CVE: CVE-2023-6891 (🔍)
GCVE (CVE): GCVE-0-2023-6891
GCVE (VulDB): GCVE-100-248251
Entry
Created: 12/16/2023 01:56 PMUpdated: 01/11/2024 07:39 PM
Changes: 12/16/2023 01:56 PM (40), 12/16/2023 01:59 PM (2), 01/11/2024 07:30 PM (2), 01/11/2024 07:39 PM (28)
Complete: 🔍
Submitter: tfhm
Cache ID: 18:537:40
Submit
Accepted
- Submit #240440: PeaZip PeaZip 9.4.0.0 DLL Hijacking (by tfhm)
No comments yet. Languages: en.
Please log in to comment.