{"uuid": "e38f5eea-41cd-4ef2-a909-1d3fbf8598e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-45159", "type": "seen", "source": "https://t.me/cibsecurity/71659", "content": "\u203c CVE-2023-45159 \u203c\n\n1E Client installer can perform arbitrary file deletion on protected files.\u00c2\u00a0\u00c2\u00a0A non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. A hotfix is available Q23092 that forces\u00c2\u00a0the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-05T14:12:35.000000Z"}