vendor:
Windows PowerShell
by:
John Page (aka hyp3rlinx)
6.1
CVSS
HIGH
PowerShell Single Quote Code Execution / Event Log Bypass
78
CWE
Product Name: Windows PowerShell
Affected Version From: Not specified
Affected Version To: Not specified
Patch Exists: NO
Related CWE:
CPE: a:microsoft:windows_powershell
Platforms Tested: Windows
Not specified
Microsoft Windows PowerShell Single Quote Code Execution and Event Log Bypass
The vulnerability in Microsoft Windows PowerShell allows for code execution bypassing single quotes using the semicolon ';' and ampersand '&' characters in filenames. By exploiting this flaw, arbitrary code execution can be triggered, and the PowerShell event log can be truncated.
Mitigation:
To mitigate this vulnerability, ensure to sanitize user input, avoid using special characters in filenames, and regularly update PowerShell to the latest version.