This vulnerability leverages a security flaw during a notification creation from the administration panel. The parameter field is passed directly into a Powershell script without any type of validation and sanitizacion
Therefore, an adversary could add a filename followed by a semicolon and a system command, such as ping -n 1 <ATTACKER_IP>, within the parameter field
When the notification is created, it can be tested by selecting an existing option on the Notifications menu, then the command will be executed
Creating the Malicious Notification
Just access to the following location →
Setup → Account Settings → Notifications
Zoom in
Then, select the Add new notification icon
Zoom in
When creating the given notification, we just have to do two things
Name the notification
Zoom in
Enable the “Execute Program” section, select “Demo exe notification - outfile.ps1” as “Program File” and enter the value below in the parameter field