GHSA-259p-rvjx-ffwg:
Panel::Software Customized WiX .be TEMP folder is vulnerable to DLL redirection attacks that allow the attacker to escalate privileges
8.3
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
2/8/2024
Updated
2/8/2024
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
PanelSW.Custom.WiX | nuget | < 3.15.0-a44 | 3.15.0-a44 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key behaviors: (1) using the user's TEMP directory (instead of a secure system location) when not running as admin, and (2) failing to restrict write access to the .be
directory. The first function CreateTempDirectory
directly creates the insecure .be
folder, while the second PathGetTempPath
enables the unsafe TEMP selection. Both are critical to the DLL redirection attack vector described in the advisory. The confidence is high because these functions align with the described exploit mechanics (CWE-426) and WiX Burn engine architecture, even without explicit code examples.