In AppSpider installer versions prior to 7.2.126, the AppSpider installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during an installation and any arbitrary code executable using the same file name.
References
Link | Resource |
---|---|
https://help.rapid7.com/appspider/release-notes/index.html?pid=7.2.126 | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: rapid7
Published: 2020-09-18T14:55:12
Updated: 2020-09-18T14:55:12
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7358
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-09-18T15:15:13.827
Modified: 2020-09-28T18:36:41.360
Link: CVE-2020-7358
JSON object: View
Redhat Information
No data.
CWE