Files
CVEs-PoC/2021/CVE-2021-44042.md
2025-09-29 21:09:30 +02:00

19 lines
989 B
Markdown

### [CVE-2021-44042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44042)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
An issue was discovered in UiPath Assistant 21.4.4. User-controlled data supplied to the --process-start argument of the URI handler for uipath-assistant:// is not correctly encoded, resulting in attacker-controlled content being injected into the error message displayed (when the injected content does not match an existing process). A determined attacker could leverage this to execute JavaScript in the context of the Electron application.
### POC
#### Reference
- https://docs.uipath.com/robot/docs/release-notes-2021-10-4
- https://docs.uipath.com/robot/docs/uipath-assistant
#### Github
No PoCs found on GitHub currently.