Open nmht3t opened 4 years ago
Please note that CVE-2020-16143 was assigned.
Sorry but I don't understand why this is a security issue. Users install Seafile client in system directories. The attacker has to first have the permission to write to the system directories. And it's usual for applications to load dlls. There are a lot of dll files in Seafile, why only is this one dangerous?
@killing is it intentional to load this library at all still? Because it was dropped from release packages some time ago. See here: https://github.com/haiwen/seafile/blob/f0097a706b007d5e6b1aff7af2c536124199840d/daemon/seaf-daemon.c#L398
DLL: exchndl.dll Affected Process: seaf-daemon.exe Tested on: Windows 10 Pro x64 Version 10.0.19041
Description: Seafile Client ver 7.0.8 is vulnerable to DLL hijacking because it loads “exchndl.dll” from the current working directory.
Steps to reproduce:
PoC Code:
Screenshots: