Arbitrary Command Execution via UNC Path in OpenText FirstClass 8.0 Client

Arbitrary Command Execution via UNC Path in OpenText FirstClass 8.0 Client

CVE-2005-1045 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

OpenText FirstClass 8.0 client does not properly sanitize strings before passing them to the Windows ShellExecute API, which allows remote attackers to execute arbitrary commands via a UNC path in a bookmark.

Learn more about our Api Penetration Testing.