VegaBird Vooki 5.2.9 DLL Hijacking ≈ Packet Storm

Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]

VegaBird Vooki 5.2.9 DLL Hijacking[6]
Authored by Iulian Florea[7]

VegaBird Vooki version 5.2.9 suffers from a dll hijacking vulnerability.

systems | windows[8]
advisories | CVE-2024-45874[9]
SHA-256 | c5f33bc21c9e871866fcbc9aa668c73fe0ec052f868a7c993eb644b8d7aa159e

Change Mirror[13] Download[14]

====================================
CVE ID: CVE-2024-45874
Author: Iulian Florea
Vendor: VegaBird
Product: Vooki - Dynamic Web Application & REST API Vulnerability Scanner (DAST Tool)
Vulnerability Type: DLL Hijacking
====================================
====================================
Summary
====================================
A DLL hijacking vulnerability in VegaBird Vooki 5.2.9 allows attackers to execute arbitrary code / maintain persistence via placing a crafted DLL file in the same directory as Yaazhini.exe.
====================================
Exploitation
====================================
By placing an arbitrary DLL (Example: dcomp.dll) within the application folder (C:\Program Files\Vooki) and opening the application (Vooki.exe) it can be noted that the DLL is being loaded. This can lead to persistence or in some cases to privilege escalation.

Login[15] or Register[16] to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services[121]
Hosting By
Rokasec[122]
close
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"