CVE-2019-12828
Severity CVSS v4.0:
Pending analysis
Type:
CWE-19
Data Handling
Publication date:
14/06/2019
Last modified:
24/06/2019
Description
An issue was discovered in Electronic Arts Origin before 10.5.39. Due to improper sanitization of the origin:// and origin2:// URI schemes, it is possible to inject additional arguments into the Origin process and ultimately leverage code execution by loading a backdoored Qt plugin remotely via the platformpluginpath argument supplied with a Windows network share.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ea:origin:*:*:*:*:*:*:*:* | 10.5.39 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/153385/EA-Origin-Remote-Code-Execution.html
- https://www.bleepingcomputer.com/news/security/qt5-based-gui-apps-susceptible-to-remote-code-execution/
- https://www.youtube.com/watch?v=E9vCx9KsF3c
- https://www.zerodayinitiative.com/advisories/ZDI-19-574/
- https://zeropwn.github.io/2019-05-22-fun-with-uri-handlers/



