Vulnerability CVE-2019-12828


Published: 2019-06-14

Description:
An issue was discovered in Electronic Arts Origin before 10.5.39. Due to improper sanitization of the origin:// and origin2:// URI schemes, it is possible to inject additional arguments into the Origin process and ultimately leverage code execution by loading a backdoored Qt plugin remotely via the platformpluginpath argument supplied with a Windows network share.

See advisories in our WLB2 database:
Topic
Author
Date
Low
EA Origin < 10.5.38 Remote Code Execution
Dominik Penner
23.06.2019

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://packetstormsecurity.com/files/153385/EA-Origin-Remote-Code-Execution.html
https://www.bleepingcomputer.com/news/security/qt5-based-gui-apps-susceptible-to-remote-code-execution/
https://www.youtube.com/watch?v=E9vCx9KsF3c
https://zeropwn.github.io/2019-05-22-fun-with-uri-handlers/

Copyright 2019, cxsecurity.com

 

Back to Top