Files
CVEs-PoC/2021/CVE-2021-30360.md
T
2024-05-25 21:48:12 +02:00

18 lines
841 B
Markdown

### [CVE-2021-30360](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30360)
![](https://img.shields.io/static/v1?label=Product&message=Check%20Point%20Remote%20Access%20Client&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-427%3A%20Uncontrolled%20Search%20Path%20Element&color=brighgreen)
### Description
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/RonnieSalomonsen/My-CVEs