Описание
The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.
Ссылки
- Third Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- Broken Link
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Press/Media CoverageThird Party Advisory
- Press/Media CoverageThird Party Advisory
- Press/Media CoverageThird Party Advisory
- Press/Media CoverageThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- Broken Link
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Press/Media CoverageThird Party Advisory
- Press/Media CoverageThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:ea:origin:10.5.36:*:*:*:*:windows:*:*
EPSS
Процентиль: 98%
0.46924
Средний
7.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-74
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.
EPSS
Процентиль: 98%
0.46924
Средний
7.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-74