The Installer in Whale allows DLL hijacking.
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Link | Tags |
---|---|
https://bugbounty.whale.naver.com/en/halloffame | issue tracking |
https://cve.naver.com/detail/cve-2017-15913.html |