UiPath Assistant 21.4.4 will load and execute attacker controlled data from the file path supplied to the --dev-widget argument of the URI handler for uipath-assistant://. This allows an attacker to execute code on a victim's machine or capture NTLM credentials by supplying a networked or WebDAV file path.
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
Link | Tags |
---|---|
https://docs.uipath.com/robot/docs/uipath-assistant | product |
https://docs.uipath.com/robot/docs/release-notes-2021-10-4 | release notes vendor advisory |