components/Modals/HelpTexts/GenericAll/GenericAll.jsx in Bloodhound <= 4.0.1 allows remote attackers to execute arbitrary system commands when the victim imports a malicious data file containing JavaScript in the objectId parameter.
CPE | Name | Operator | Version |
---|---|---|---|
bloodhound | eq | 1.0.0 | |
bloodhound | eq | 2.1.0 | |
bloodhound | eq | 1.4 | |
bloodhound | eq | 2.2.1 | |
bloodhound | eq | 1.1 | |
bloodhound | eq | 1.5.2 | |
bloodhound | eq | 1.5.1 | |
bloodhound | eq | 3.0.0 | |
bloodhound | eq | 2.0.5 | |
bloodhound | eq | 3.0.5 |
github.com/BloodHoundAD/BloodHound/blob/338e197dc4b7a1ee929c335141172ada5bc80800/src/components/Modals/HelpModal.jsx#L57
github.com/BloodHoundAD/BloodHound/blob/338e197dc4b7a1ee929c335141172ada5bc80800/src/components/Modals/HelpTexts/GenericAll/GenericAll.jsx#L31-L37
github.com/BloodHoundAD/BloodHound/issues/338