CVE-2024-12908

Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version 6.0.3.26) where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a remote attacker may be able to convince a user to visit a malicious web-page, or open a malicious document which could trigger the vulnerable handler, allowing them to execute arbitrary code on the user's machine. Delinea added additional validation that the downloaded installer's batch file was in the expected format.
Configurations

Configuration 1 (hide)

cpe:2.3:a:delinea:secret_server:*:*:*:*:on-premises:*:*:*

History

15 Oct 2025, 17:08

Type Values Removed Values Added
First Time Delinea
Delinea secret Server
CPE cpe:2.3:a:delinea:secret_server:*:*:*:*:on-premises:*:*:*
Summary
  • (es) Delinea abordó un caso informado en Secret Server v11.7.31 (versión del controlador de protocolo 6.0.3.26) donde, dentro de la función del controlador de protocolo, se compararon las URL antes de la normalización y la canonización, lo que potencialmente llevó a una coincidencia excesiva con la lista aprobada. Si este ataque se explotara con éxito, un atacante remoto podría convencer a un usuario de visitar una página web maliciosa o abrir un documento malicioso que podría activar el controlador vulnerable, lo que le permitiría ejecutar código arbitrario en la máquina del usuario. Delinea agregó una validación adicional de que el archivo por lotes del instalador descargado estaba en el formato esperado.
References () https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/ - () https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/ - Exploit, Third Party Advisory
References () https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000049.htm - () https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000049.htm - Release Notes
References () https://trust.delinea.com/ - () https://trust.delinea.com/ - Product

27 Dec 2024, 15:15

Type Values Removed Values Added
References () https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/ - () https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/ -

26 Dec 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-26 16:15

Updated : 2025-10-15 17:08


NVD link : CVE-2024-12908

Mitre link : CVE-2024-12908

CVE.ORG link : CVE-2024-12908


JSON object : View

Products Affected

delinea

  • secret_server
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')