UiPath Assistant 21.4.4 will load and execute attacker controlled data from the file path supplied to the –dev-widget argument of the URI handler for uipath-assistant://. This allows an attacker to execute code on a victims machine or capture NTLM credentials by supplying a networked or WebDAV file path.
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Assistant | Uipath | 21.4.4 (including) | 21.4.4 (including) |