提出 #603715: Comodo Security Solutions Comodo Internet Security Premium 12 Path Traversal情報

タイトルComodo Security Solutions Comodo Internet Security Premium 12 Path Traversal
説明Comodo IS uses value in section name as download file name without any sanitize or validation. Threat actor can craft path traversal payload in manifest file, writes malicious file inside startup folder. The threat actor can remotely control the victim's machine after a reboot. Even though untrusted file runs under Comodo isolation, threat actor can use post-exploit modules like bypass UAC to get SYSTEM privilege, and hashdump or mimikatz to gather system's credentials.
ソース⚠️ https://drive.google.com/file/d/1qnWarYsTSc5_sV6o8ULv0LBvGfKKXPxn/view?usp=sharing
ユーザー
 FPT IS Security (UID 72751)
送信2025年06月25日 10:45 (10 月 ago)
モデレーション2025年07月05日 17:36 (10 days later)
ステータス承諾済み
VulDBエントリ315012 [Comodo Internet Security Premium 12.3.4.8162 File Name name/folder ディレクトリトラバーサル]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!