Severity
High
Analysis Summary
PowerShell can potentially execute arbitrary code when running specially named scripts due to trusting unsanitized filenames. This occurs when “.ps1” files contain semicolons “;” or spaces as part of the filename, causing the execution of a different trojan file;or the running of unexpected commands straight from the filename itself without the need for a second file.
Impact
Command execution
Affected Vendors
Microsoft
Affected Products
Windows PowerShell
Remediation
There are no patches/ updates for this product as of yet.