The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.
References
Configurations
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://gamasutra.com/view/news/340907/A_nowfixed_Origin_vulnerability_potentially_opened_the_client_to_hackers.php - Third Party Advisory | |
References | () http://packetstormsecurity.com/files/153375/dotProject-2.1.9-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/153485/EA-Origin-Template-Injection-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://blog.underdogsecurity.com/rce_in_origin_client/ - Broken Link | |
References | () https://gizmodo.com/ea-origin-users-update-your-client-now-1834079604 - Exploit, Third Party Advisory | |
References | () https://techcrunch.com/2019/04/16/ea-origin-bug-exposed-hackers/ - Exploit, Third Party Advisory | |
References | () https://www.golem.de/news/sicherheitsluecke-ea-origin-fuehrte-schadcode-per-link-aus-1904-140738.html - Press/Media Coverage, Third Party Advisory | |
References | () https://www.pcmag.com/news/367801/security-flaw-allowed-any-app-to-run-using-eas-origin-clien - Press/Media Coverage, Third Party Advisory | |
References | () https://www.techradar.com/news/major-security-flaw-found-in-ea-origin-gaming-client - Press/Media Coverage, Third Party Advisory | |
References | () https://www.thesun.co.uk/tech/8877334/sims-4-battlefield-fifa-origin-hackers/ - Press/Media Coverage, Third Party Advisory | |
References | () https://www.trustedreviews.com/news/time-update-origin-eas-game-client-security-risk-just-installed-3697942 - Third Party Advisory | |
References | () https://www.vg247.com/2019/04/17/ea-origin-security-flaw-run-malicious-code-fixed/ - Third Party Advisory |
Information
Published : 2019-04-19 22:29
Updated : 2024-11-21 04:20
NVD link : CVE-2019-11354
Mitre link : CVE-2019-11354
CVE.ORG link : CVE-2019-11354
JSON object : View
Products Affected
ea
- origin
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')