提交 #687547: Muse Group MuseHub 2.1.0.1567 Unquoted Search Path信息

标题Muse Group MuseHub 2.1.0.1567 Unquoted Search Path
描述When a Windows service is configured with an executable path that contains spaces but the path is not quoted, Windows may search for and attempt to execute an executable at intermediate path segments. If one of those intermediate segments is writable by a low-privileged local user, an attacker can place an executable at that location which may be executed by the service on start or restart. In this case the service points to an unquoted path under C:\Program Files\... and evidence shows C:\Program is writable. That creates an unquoted service path vulnerability enabling local low-privileged users to achieve code execution under the service account when the service launches.
来源⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/Musehub.md
用户
 lakshay12311 (UID 91298)
提交2025-11-02 11時28分 (6 月前)
管理2025-11-19 17時52分 (17 days later)
状态已接受
VulDB条目332977 [Muse Group MuseHub 2.1.0.1567 Windows Service Muse.Updater.exe 权限提升]
积分20

Do you want to use VulDB in your project?

Use the official API to access entries easily!