Arbitrary Code Execution and NTLM Credential Capture in UiPath Assistant 21.4.4

Arbitrary Code Execution and NTLM Credential Capture in UiPath Assistant 21.4.4

CVE-2021-44041 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

UiPath Assistant 21.4.4 will load and execute attacker controlled data from the file path supplied to the --dev-widget argument of the URI handler for uipath-assistant://. This allows an attacker to execute code on a victim's machine or capture NTLM credentials by supplying a networked or WebDAV file path.

Learn more about our Web App Pen Testing.