Description
MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user.
Problem types
CWE-428 Unquoted search path or element
Product status
Any version before 26.1
Credits
Spektion Research Team
VulnCheck
References
mobaxterm.mobatek.net/download-home-edition.html
www.vulncheck.com/...mobaxterm-notepad-unquoted-service-path