-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
BUG/ISSUE : DLL Hijacking Vulnerability in Unyo v0.6.7 | Responsible Disclosure #58
Comments
Hi, will look into it :(. I honestly haven't being making updates but this seems serious enough for me to do some research and release a fix, I can't guarantee I will be able to do so fast since it's been a while since I've done some progress due to lack of time and the state of my personal life right now, worst case scenario I'll put a warning on the readme and on launching the app warning people. Really appreciate the issue man, thank u, and if you have any tips on how I could tackle this or know other flutter apps that have solved this issue please let me know. Best regards, Kevin Borges. |
Take your time buddy, since you have to ensure that fixing this issue does not introduce any new vulnerabilities haha. I hope your personal life gets sorted out enough for you to find time to dedicate to this project since we really appreciate the work that you have put into it. I don't know a lot about Flutter apps but from what I have gathered, in Flutter the direct control over which DLLs are loaded is limited, as most of the lower-level system operations are managed by the underlying engine (written in C++). However, you can prevent certain libraries from being loaded by disabling specific backends or by modifying the native Windows code generated by Flutter. Here's how you can ensure 1. Modify
|
Hi, not a lot of progress but I looked into it once, once I have more updates I'll let you know, I will add this to known issues though |
Description
I have discovered a DLL Hijacking vulnerability in Unyo v.0.6.7 running on Windows 10 Pro 2H22.
The application searches for the following DLLs during runtime but fails to locate them:
DWriteCore.dll
vulkan-1.dll
Since the application does not verify the integrity of these DLLs before loading, an attacker can craft malicious DLLs with these names. When Unyo is launched, the malicious DLLs can be executed, potentially allowing arbitrary code execution.
Environment
Steps to Reproduce
DWriteCore.dll
orvulkan-1.dll
).Impact
Successful exploitation allows an attacker to execute arbitrary code in the context of the application, potentially leading to:
Expected Behavior
The application should verify the integrity of DLLs before loading them (e.g., by using digital signatures or specifying absolute paths).
The text was updated successfully, but these errors were encountered: