This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender SafePay. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of TIScript. The issue lies in the handling of the openFile method, which allows for an arbitrary file write with attacker controlled data. An attacker can leverage this vulnerability execute code in the context of the current process.
Affected Software | Affected Version | How to fix |
---|---|---|
Bitdefender SafePay |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-7247 is critical due to its ability to allow remote code execution.
To fix ZDI-CAN-7247, update your Bitdefender SafePay to the latest version where the vulnerability is patched.
ZDI-CAN-7247 involves remote code execution attacks that require user interaction, such as visiting a malicious webpage or opening a malicious file.
ZDI-CAN-7247 affects installations of Bitdefender SafePay.
Exploiting ZDI-CAN-7247 could allow attackers to execute arbitrary code on the affected system.