We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-12908



Description

Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version 6.0.3.26) where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a remote attacker may be able to convince a user to visit a malicious web-page, or open a malicious document which could trigger the vulnerable handler, allowing them to execute arbitrary code on the user's machine. Delinea added additional validation that the downloaded installer's batch file was in the expected format.

Reserved 2024-12-23 | Published 2024-12-26 | Updated 2024-12-27 | Assigner Delinea


MEDIUM: 6.9CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

11.7.31
affected

Credits

David Cash and Richard Warren of Amber Wolf reporter

References

docs.delinea.com/...rver/release-notes/ss-rn-11-7-000049.htm release-notes

trust.delinea.com/ vendor-advisory

blog.amberwolf.com/...ote-code-execution-via-update-process/ third-party-advisory

cve.org (CVE-2024-12908)

nvd.nist.gov (CVE-2024-12908)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-12908

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.