vendor:
Windows PowerShell
by:
John Page (aka hyp3rlinx)
6.1
CVSS
HIGH
PowerShell Single Quote Code Execution / Event Log Bypass
78
CWE
Product Name: Windows PowerShell
Affected Version From: Not specified
Affected Version To: Not specified
Patch Exists: NO
Related CWE:
CPE: o:microsoft:windows
Platforms Tested: Windows
Not specified
Windows PowerShell Single Quote Code Execution and Event Log Bypass
The vulnerability in Windows PowerShell allows the execution of arbitrary code by combining the semicolon ";" and ampersand "&" characters to bypass the single quote limitation in filenames. This can lead to event log failures and code execution. By using specially crafted filenames, an attacker can trigger malicious code execution. This issue affects PowerShell API calls and module commands.
Mitigation:
Avoid using user-controlled input as filenames. Always sanitize and validate input to prevent code injection attacks.