Improper input validation in Microsoft PowerShell allows an unauthorized attacker to bypass a security feature locally.
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker would have to send the victim a malicious file that the victim would have to execute. What kind of security feature could be bypassed by successfully exploiting this vulnerability? Exploiting this vulnerability bypasses dynamic-expression security checks which may lead to arbitrary code execution when then -SkipLimitCheck is used with Import-PowerShellDataFile. If you do not use the -SkipLimitCheck switch, you are not affected. Is the Windows native version of PowerShell affected by this vulnerability? No, this vulnerability was introduced after PowerShell was forked from Windows powerShell so the inbox version is not affected. The current store app addresses the vulnerability.
<a href="https://github.com/surfingoldelephant">surfingoldelephant</a>