Описание
nxapplet.jar in No Machine NX Web Companion 3.x and earlier does not properly verify the authenticity of updates, which allows user-assisted remote attackers to execute arbitrary code via a crafted (1) SiteUrl or (2) RedirectUrl parameter that points to a Trojan Horse client.zip update file.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.5.0-2 (включая)
Одно из
cpe:2.3:a:nomachine:nx_web_companion:*:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:1.5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:1.5.0:beta3:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:2.0.0-1:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:2.1.0-1:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.0.0-1:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.0.0-2:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.0.0-3:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.0.0-4:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.0.0-5:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.1.0-1:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.2.0-1:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.3.0-1:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.3.0-2:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.4.0-1:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.4.0-2:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.4.0-3:*:*:*:*:*:*:*
cpe:2.3:a:nomachine:nx_web_companion:3.5.0-1:*:*:*:*:*:*:*
EPSS
Процентиль: 80%
0.01469
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-287
Связанные уязвимости
github
около 3 лет назад
nxapplet.jar in No Machine NX Web Companion 3.x and earlier does not properly verify the authenticity of updates, which allows user-assisted remote attackers to execute arbitrary code via a crafted (1) SiteUrl or (2) RedirectUrl parameter that points to a Trojan Horse client.zip update file.
EPSS
Процентиль: 80%
0.01469
Низкий
6.8 Medium
CVSS2
Дефекты
CWE-287