CVE-2022-AVAST2 : Self-Defense Bypass via Repairing Function

Description

It was noted that there is security checking to prevent some of the Avast processes from loading of undesired/unsigned DLLs via DLL hijacking attack.

However, It was noted that there are two Avast processes “instup.exe” and “wsc_proxy.exe” which are vulnerable to DLL hijacking vulnerability. These processes will attempt to load an non-existing DLL while calling “REPAIR APP” function. Due to the lack of security checking while loading the DLL, attackers who have administrative privilege could drop a malicious DLL on a dedicated location and get it loaded by the affected Avast processes.

Since those vulnerable components are Avast protected processes, attacker could inject malicious code to control the Avast protected processes for malicious purposes such as deactivating the antivirus and staging malware.

For more information

https://github.com/netero1010/Vulnerability-Disclosure/tree/main/CVE-2022-AVAST2

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2022-32532 : APACHE SHIRO UP TO 1.9.0 REGEXREQUESTMATCHER AUTHORIZATION

CVE-2022-32532 : APACHE SHIRO UP TO 1.9.0 REGEXREQUESTMATCHER AUTHORIZATION

Description Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher

CVE-2022-31104 : WASMTIME CALCULATION

CVE-2022-31104 : WASMTIME CALCULATION

Description Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime’s implementation of the SIMD proposal for WebAssembly on

CVE-2022-33146 : WEB2PY UP TO 2.22.4 URL REDIRECT

CVE-2022-33146 : WEB2PY UP TO 2.22.4 URL REDIRECT

Description Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an