KioWare through 8.33 on Windows sets KioScriptingUrlACL.AclActions.AllowHigh for the about:blank origin, which allows attackers to obtain SYSTEM access via KioUtils.Execute in JavaScript code.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.kioware.com/versionhistory.aspx?pid=15 | release notes |
https://github.com/olnor18/writeup/tree/master/CVE/CVE-2022-44875 | third party advisory exploit |