Overwolf Client 0.169.0.22 allows XSS, with resultant Remote Code Execution, via an overwolfstore:// URL.
References
Link | Resource |
---|---|
https://github.com/swordbytes/Advisories/blob/master/2021/Advisory_CVE-2021-33501.pdf | Exploit Third Party Advisory |
https://swordbytes.com/blog/security-advisory-overwolf-1-click-remote-code-execution-cve-2021-33501/ | Exploit Vendor Advisory |
https://www.overwolf.com | Product |
https://github.com/swordbytes/Advisories/blob/master/2021/Advisory_CVE-2021-33501.pdf | Exploit Third Party Advisory |
https://swordbytes.com/blog/security-advisory-overwolf-1-click-remote-code-execution-cve-2021-33501/ | Exploit Vendor Advisory |
https://www.overwolf.com | Product |
Configurations
History
21 Nov 2024, 06:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/swordbytes/Advisories/blob/master/2021/Advisory_CVE-2021-33501.pdf - Exploit, Third Party Advisory | |
References | () https://swordbytes.com/blog/security-advisory-overwolf-1-click-remote-code-execution-cve-2021-33501/ - Exploit, Vendor Advisory | |
References | () https://www.overwolf.com - Product |
Information
Published : 2021-07-19 12:15
Updated : 2024-11-21 06:08
NVD link : CVE-2021-33501
Mitre link : CVE-2021-33501
CVE.ORG link : CVE-2021-33501
JSON object : View
Products Affected
overwolf
- overwolf
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')