Loading HuntDB...

Arbitrary local code execution via DLL hijacking from executable installer

Medium
B
Brave Software
Submitted None
Reported by skanthak

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
> NOTE! Thanks for submitting a report! Please fill all sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to verify and then potentially issue a bounty. ## Summary: The executable installer BraveSetup-ia32.exe is vulnerable to DLL hijacking: it loads (at least) version.dll from its application directory (which is typically the user's "Downloads" directory %USERPROFILE%\Downloads) instead Windows' system directory %SystemRoot%\System32 ## Products affected: Windows 7 and newer versions, Brave version 0.18.36 ## Steps To Reproduce: Place the attached version.dll in %USERPROFILE%\Downloads, download the current BraveSetup-ia32.exe and execute it: version.dll displays message boxes showing its caller. ## Supporting Material/References: See https://skanthak.homepage.t-online.de/sentinel.dll

Report Details

Additional information and metadata

State

Closed

Substate

Duplicate

Submitted

Weakness

Violation of Secure Design Principles