Mids' Reborn Hero Designer 2.6.0.7 has an elevation of privilege vulnerability due to default and insecure permissions being set for the installation folder. By default, the Authenticated Users group has Modify permissions to the installation folder. Because of this, any user on the system can replace binaries or plant malicious DLLs to obtain elevated, or different, privileges, depending on the context of the user that runs the application.
References
Link | Resource |
---|---|
https://github.com/Crytilis/mids-reborn-hero-designer/releases | Release Notes Third Party Advisory |
https://www.doyler.net/security-not-included/mids-reborn-vulnerabilities | Exploit Third Party Advisory |
https://github.com/Crytilis/mids-reborn-hero-designer/releases | Release Notes Third Party Advisory |
https://www.doyler.net/security-not-included/mids-reborn-vulnerabilities | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Crytilis/mids-reborn-hero-designer/releases - Release Notes, Third Party Advisory | |
References | () https://www.doyler.net/security-not-included/mids-reborn-vulnerabilities - Exploit, Third Party Advisory |
Information
Published : 2020-06-11 17:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11613
Mitre link : CVE-2020-11613
CVE.ORG link : CVE-2020-11613
JSON object : View
Products Affected
mids\'_reborn_hero_designer_project
- mids\'_reborn_hero_designer