CVE-2019-11354

The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.
References
Link Resource
http://gamasutra.com/view/news/340907/A_nowfixed_Origin_vulnerability_potentially_opened_the_client_to_hackers.php Third Party Advisory
http://packetstormsecurity.com/files/153375/dotProject-2.1.9-SQL-Injection.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153485/EA-Origin-Template-Injection-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
https://blog.underdogsecurity.com/rce_in_origin_client/ Broken Link
https://gizmodo.com/ea-origin-users-update-your-client-now-1834079604 Exploit Third Party Advisory
https://techcrunch.com/2019/04/16/ea-origin-bug-exposed-hackers/ Exploit Third Party Advisory
https://www.golem.de/news/sicherheitsluecke-ea-origin-fuehrte-schadcode-per-link-aus-1904-140738.html Press/Media Coverage Third Party Advisory
https://www.pcmag.com/news/367801/security-flaw-allowed-any-app-to-run-using-eas-origin-clien Press/Media Coverage Third Party Advisory
https://www.techradar.com/news/major-security-flaw-found-in-ea-origin-gaming-client Press/Media Coverage Third Party Advisory
https://www.thesun.co.uk/tech/8877334/sims-4-battlefield-fifa-origin-hackers/ Press/Media Coverage Third Party Advisory
https://www.trustedreviews.com/news/time-update-origin-eas-game-client-security-risk-just-installed-3697942 Third Party Advisory
https://www.vg247.com/2019/04/17/ea-origin-security-flaw-run-malicious-code-fixed/ Third Party Advisory
http://gamasutra.com/view/news/340907/A_nowfixed_Origin_vulnerability_potentially_opened_the_client_to_hackers.php Third Party Advisory
http://packetstormsecurity.com/files/153375/dotProject-2.1.9-SQL-Injection.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153485/EA-Origin-Template-Injection-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
https://blog.underdogsecurity.com/rce_in_origin_client/ Broken Link
https://gizmodo.com/ea-origin-users-update-your-client-now-1834079604 Exploit Third Party Advisory
https://techcrunch.com/2019/04/16/ea-origin-bug-exposed-hackers/ Exploit Third Party Advisory
https://www.golem.de/news/sicherheitsluecke-ea-origin-fuehrte-schadcode-per-link-aus-1904-140738.html Press/Media Coverage Third Party Advisory
https://www.pcmag.com/news/367801/security-flaw-allowed-any-app-to-run-using-eas-origin-clien Press/Media Coverage Third Party Advisory
https://www.techradar.com/news/major-security-flaw-found-in-ea-origin-gaming-client Press/Media Coverage Third Party Advisory
https://www.thesun.co.uk/tech/8877334/sims-4-battlefield-fifa-origin-hackers/ Press/Media Coverage Third Party Advisory
https://www.trustedreviews.com/news/time-update-origin-eas-game-client-security-risk-just-installed-3697942 Third Party Advisory
https://www.vg247.com/2019/04/17/ea-origin-security-flaw-run-malicious-code-fixed/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ea:origin:10.5.36:*:*:*:*:windows:*:*

History

No history.

Information

Published : 2019-04-19 22:29

Updated : 2024-11-21 04:20


NVD link : CVE-2019-11354

Mitre link : CVE-2019-11354

CVE.ORG link : CVE-2019-11354


JSON object : View

Products Affected

ea

  • origin
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')