Mids' Reborn Hero Designer 2.6.0.7 downloads the update manifest, as well as update files, over cleartext HTTP. Additionally, the application does not perform file integrity validation for files after download. An attacker can perform a man-in-the-middle attack against this connection and replace executable files with malicious versions, which the operating system then executes under the context of the user running Hero Designer.
References
Link | Resource |
---|---|
https://github.com/Crytilis/mids-reborn-hero-designer/releases | Release Notes Third Party Advisory |
https://www.doyler.net/security-not-included/mids-reborn-vulnerabilities | Exploit Third Party Advisory |
https://github.com/Crytilis/mids-reborn-hero-designer/releases | Release Notes Third Party Advisory |
https://www.doyler.net/security-not-included/mids-reborn-vulnerabilities | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Crytilis/mids-reborn-hero-designer/releases - Release Notes, Third Party Advisory | |
References | () https://www.doyler.net/security-not-included/mids-reborn-vulnerabilities - Exploit, Third Party Advisory |
Information
Published : 2020-06-11 17:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11614
Mitre link : CVE-2020-11614
CVE.ORG link : CVE-2020-11614
JSON object : View
Products Affected
mids\'_reborn_hero_designer_project
- mids\'_reborn_hero_designer