Vulnerability CVE-2019-11354


Published: 2019-04-19

Description:
The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.

See advisories in our WLB2 database:
Topic
Author
Date
Low
EA Origin < 10.5.38 Remote Code Execution
Dominik Penner
23.06.2019
High
EA Origin Template Injection Remote Code Execution
Dominik Penner
02.07.2019

Vendor: EA
Product: Origin 
Version: 10.5.36;

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://gamasutra.com/view/news/340907/A_nowfixed_Origin_vulnerability_potentially_opened_the_client_to_hackers.php
http://packetstormsecurity.com/files/153375/dotProject-2.1.9-SQL-Injection.html
http://packetstormsecurity.com/files/153485/EA-Origin-Template-Injection-Remote-Code-Execution.html
https://blog.underdogsecurity.com/rce_in_origin_client/
https://gizmodo.com/ea-origin-users-update-your-client-now-1834079604
https://techcrunch.com/2019/04/16/ea-origin-bug-exposed-hackers/
https://www.golem.de/news/sicherheitsluecke-ea-origin-fuehrte-schadcode-per-link-aus-1904-140738.html
https://www.pcmag.com/news/367801/security-flaw-allowed-any-app-to-run-using-eas-origin-clien
https://www.techradar.com/news/major-security-flaw-found-in-ea-origin-gaming-client
https://www.thesun.co.uk/tech/8877334/sims-4-battlefield-fifa-origin-hackers/
https://www.trustedreviews.com/news/time-update-origin-eas-game-client-security-risk-just-installed-3697942
https://www.vg247.com/2019/04/17/ea-origin-security-flaw-run-malicious-code-fixed/

Related CVE
CVE-2014-5921
The Need for Speed Network (aka com.ea.nfsautolog.bv) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certific...
CVE-2010-2627
Multiple directory traversal vulnerabilities in the Refractor 2 engine, as used in Battlefield 2 1.50 (1.5.3153-802.0) and earlier, and Battlefield 2142 (1.10.48.0) and earlier, allow remote servers to overwrite arbitrary files on the client via "..\...
CVE-2008-6737
Crysis 1.21 and earlier allows remote attackers to obtain sensitive player information such as real IP addresses by sending a keyexchange packet without a previous join packet, which causes Crysis to send a disconnect packet that includes unrelated l...
CVE-2008-6712
The HTTP/XML-RPC service in Crysis 1.21 (game version 1.1.1.6156) and earlier allows remote attackers to cause a denial of service (crash) via a long HTTP request, which triggers a NULL pointer dereference.

Copyright 2019, cxsecurity.com

 

Back to Top