CVE-2024-48091

7.8 HIGH

📋 TL;DR

Tally Prime Edit Log v2.1 contains a DLL hijacking vulnerability in TextShaping.dll that allows attackers to execute arbitrary code by placing a malicious DLL in a location where the application searches for it. This affects users running Tally Prime Edit Log v2.1 on Windows systems. Attackers could gain control of affected systems if they can place malicious files in accessible directories.

💻 Affected Systems

Products:
  • Tally Prime Edit Log
Versions: v2.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker ability to place malicious DLL in directory where application searches for TextShaping.dll, typically requires local access or network share write permissions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative privileges, data theft, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or code execution in the context of the user running Tally Prime Edit Log, potentially leading to lateral movement within the network.

🟢

If Mitigated

Limited impact due to restricted file permissions, application sandboxing, or user running with minimal privileges.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access or ability to write to directories the application searches. DLL hijacking is a well-known technique but specific exploit details aren't publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tally Solutions for latest version

Vendor Advisory: https://tallysolutions.com/download/

Restart Required: No

Instructions:

1. Visit https://tallysolutions.com/download/ 2. Download latest version of Tally Prime Edit Log 3. Install update 4. Verify TextShaping.dll is properly signed and located in correct directory

🔧 Temporary Workarounds

Restrict DLL search paths

Windows

Use application control policies to restrict where Tally Prime Edit Log can load DLLs from

Set secure DLL search order

Windows

Configure Windows to use SafeDllSearchMode to prevent loading DLLs from current directory

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Restrict file permissions to prevent unauthorized users from writing to application directories
  • Run Tally Prime Edit Log with minimal user privileges to limit impact of successful exploitation

🔍 How to Verify

Check if Vulnerable:

Check if Tally Prime Edit Log v2.1 is installed and if TextShaping.dll can be replaced in application directories

Check Version:

Check application properties or About dialog in Tally Prime Edit Log

Verify Fix Applied:

Verify installed version is newer than v2.1 and check DLL signatures/hashes

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loading events in Windows Event Logs (Security/System)
  • Process creation from Tally Prime Edit Log with unusual parent processes

Network Indicators:

  • Unusual outbound connections from Tally Prime Edit Log process

SIEM Query:

Process creation where parent process contains 'tally' AND (command line contains unusual DLL paths OR image loaded from unusual locations)

🔗 References

📤 Share & Export