Vulnerability CVE-2019-11354


Published: 2019-04-19   Modified: 2019-04-20

Description:
The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.

See advisories in our WLB2 database:
Topic
Author
Date
Low
EA Origin < 10.5.38 Remote Code Execution
Dominik Penner
23.06.2019
High
EA Origin Template Injection Remote Code Execution
Dominik Penner
02.07.2019

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
EA -> Origin 

 References:
http://gamasutra.com/view/news/340907/A_nowfixed_Origin_vulnerability_potentially_opened_the_client_to_hackers.php
http://packetstormsecurity.com/files/153375/dotProject-2.1.9-SQL-Injection.html
http://packetstormsecurity.com/files/153485/EA-Origin-Template-Injection-Remote-Code-Execution.html
https://blog.underdogsecurity.com/rce_in_origin_client/
https://gizmodo.com/ea-origin-users-update-your-client-now-1834079604
https://techcrunch.com/2019/04/16/ea-origin-bug-exposed-hackers/
https://www.golem.de/news/sicherheitsluecke-ea-origin-fuehrte-schadcode-per-link-aus-1904-140738.html
https://www.pcmag.com/news/367801/security-flaw-allowed-any-app-to-run-using-eas-origin-clien
https://www.techradar.com/news/major-security-flaw-found-in-ea-origin-gaming-client
https://www.thesun.co.uk/tech/8877334/sims-4-battlefield-fifa-origin-hackers/
https://www.trustedreviews.com/news/time-update-origin-eas-game-client-security-risk-just-installed-3697942
https://www.vg247.com/2019/04/17/ea-origin-security-flaw-run-malicious-code-fixed/

Copyright 2024, cxsecurity.com

 

Back to Top