An issue was discovered in UiPath Assistant 21.4.4. User...
Critical severity
Unreviewed
Published
Dec 15, 2021
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Dec 14, 2021
Published to the GitHub Advisory Database
Dec 15, 2021
Last updated
Jan 27, 2023
An issue was discovered in UiPath Assistant 21.4.4. User-controlled data supplied to the --process-start argument of the URI handler for uipath-assistant:// is not correctly encoded, resulting in attacker-controlled content being injected into the error message displayed (when the injected content does not match an existing process). A determined attacker could leverage this to execute JavaScript in the context of the Electron application.
References