Redgate .NET Reflector before 10.0.7.774 and SmartAssembly before 6.12.5 allow attackers to execute code by decompiling a compiled .NET object (such as a DLL or EXE file) with a specific embedded resource file.
References
Link | Resource |
---|---|
https://documentation.red-gate.com/ref10/release-notes-and-other-versions/net-reflector-10-0-release-notes | Release Notes Vendor Advisory |
https://documentation.red-gate.com/sa6/release-notes-and-other-versions/smartassembly-6-12-release-notes | Release Notes Vendor Advisory |
https://www.nccgroup.trust/us/our-research/technical-advisory-code-execution-by-viewing-resource-files-in-.net-reflector/?research=Technical+advisories | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-07-31 14:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-14581
Mitre link : CVE-2018-14581
CVE.ORG link : CVE-2018-14581
JSON object : View
Products Affected
red-gate
- smartassembly
- .net_reflector
CWE
CWE-20
Improper Input Validation