BattlEye v0.9 contains an unquoted service path which allows attackers to escalate privileges to the system level.
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/50815 | exploit vdb entry third party advisory |