Filtered by vendor Uipath
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-44043 | 1 Uipath | 1 App Studio | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
An issue was discovered in UiPath App Studio 21.4.4. There is a persistent XSS vulnerability in the file-upload functionality for uploading icons when attempting to create new Apps. An attacker with minimal privileges in the application can build their own App and upload a malicious file containing an XSS payload, by uploading an arbitrary file and modifying the MIME type in a subsequent HTTP request. This then allows the file to be stored and retrieved from the server by other users in the same organization. | |||||
CVE-2021-44042 | 1 Uipath | 1 Assistant | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in UiPath Assistant 21.4.4. User-controlled data supplied to the --process-start argument of the URI handler for uipath-assistant:// is not correctly encoded, resulting in attacker-controlled content being injected into the error message displayed (when the injected content does not match an existing process). A determined attacker could leverage this to execute JavaScript in the context of the Electron application. | |||||
CVE-2021-44041 | 1 Uipath | 1 Assistant | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
UiPath Assistant 21.4.4 will load and execute attacker controlled data from the file path supplied to the --dev-widget argument of the URI handler for uipath-assistant://. This allows an attacker to execute code on a victim's machine or capture NTLM credentials by supplying a networked or WebDAV file path. | |||||
CVE-2018-19855 | 1 Uipath | 1 Orchestrator | 2024-11-21 | 4.3 MEDIUM | 5.5 MEDIUM |
UiPath Orchestrator before 2018.3.4 allows CSV Injection, related to the Audit export, Robot log export, and Transaction log export features. | |||||
CVE-2018-17305 | 1 Uipath | 1 Orchestrator | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
UiPath Orchestrator through 2018.2.4 allows any authenticated user to change the information of arbitrary users (even administrators) leading to privilege escalation and remote code execution. |