Skip to content

Conversation

@ventdrop
Copy link

@ventdrop ventdrop commented Feb 3, 2026

Summary:
Added 4 new DLL sideloading configurations across 3 vendors. All entries have been verified with a PoC or existing research.

JRiver Media Center - JRService.exe
Vulnerability: BYO JRService.exe loads JRTools.dll from the current working directory.
Verification: Tested with a custom C++ proxy DLL (MessageBox PoC), seen in IR
Reference: Write up created here for a reference

Siber Systems (RoboForm) - RoboTaskBarIcon.exe
Vulnerability: Binary loads architecture-specific DLLs from its execution path.
x86: RoboTaskBarIcon.exe -> roboform.dll
x64: robotaskbaricon-x64.exe -> roboform-x64.dll
Verification: Based on existing vulnerability data; added separate YAMLs for architecture-specific detection logic.

Microsoft - MdMerge.exe
Vulnerability: MdMerge.exe loads MidLrtMd.dll from the current directory.
Verification: Verified via standard search order hijacking; added to microsoft/external as it is a common developer tool component.

@ventdrop ventdrop requested a review from wietze as a code owner February 3, 2026 10:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant