Hubstaff 1.6.14 contains a DLL search order hijacking vulnerability that allows attackers to replace a missing system32 wow64log.dll with a malicious library. Attackers can generate a custom DLL using Metasploit and place it in the system32 directory to obtain a reverse shell during application startup.
References
| Link | Resource |
|---|---|
| https://hubstaff.com/ | Product |
| https://www.exploit-db.com/exploits/51461 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/hubstaff-dll-search-order-hijacking-via-wowlog-library | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-12-18 20:15
Updated : 2026-01-14 20:02
NVD link : CVE-2023-53937
Mitre link : CVE-2023-53937
CVE.ORG link : CVE-2023-53937
JSON object : View
Products Affected
hubstaff
- hubstaff
CWE
CWE-427
Uncontrolled Search Path Element
