Description
When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges. This issue affects ABP and AES: from ABP 2.0 through 2.0.7.9050, from AES 1.0 through 1.0.6.8290.
Problem types
CWE-427 Uncontrolled Search Path Element
Product status
ABP 2.0 (custom)
AES 1.0 (custom)
Credits
Kazuma Matsumoto, Security Researcher at GMO Cybersecurity by IERAE, Inc.
References
www.asustor.com/security/security_advisory_detail?id=48