In the affected version of the 1E Client, an ordinary...
High severity
Unreviewed
Published
Oct 5, 2023
to the GitHub Advisory Database
•
Updated Nov 11, 2023
Description
Published by the National Vulnerability Database
Oct 5, 2023
Published to the GitHub Advisory Database
Oct 5, 2023
Last updated
Nov 11, 2023
In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. This has been fixed in patch Q23094 as the 1E Client's temporary directory is now locked down
References