7 results (0.007 seconds)

CVSS: 5.4EPSS: 0%CPEs: 2EXPL: 0

A cross-site scripting (XSS) vulnerability exists in the Origin Client for Mac and PC 10.5.86 or earlier that could allow a remote attacker to execute arbitrary Javascript in a target user’s Origin client. An attacker could use this vulnerability to access sensitive data related to the target user’s Origin account, or to control or monitor the Origin text chat window. Se presenta una vulnerabilidad de tipo cross-site scripting (XSS) en Origin Client para Mac y PC versión 10.5.86 que podría permitir a un atacante remoto ejecutar JavaScript arbitrario en Origin Client de un usuario objetivo. Un atacante podría usar esta vulnerabilidad para acceder a datos confidenciales relacionados con la cuenta de Origin del usuario objetivo, o para controlar o monitorear la ventana de chat de texto de Origin • https://github.com/Monairy/Security-Advisories/blob/master/CVE%202020-15914 https://www.ea.com/security/news/easec-2020-003-cross-site-scripting-vulnerability-in-origin-client • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability exists in the Origin Client that could allow a non-Administrative user to elevate their access to either Administrator or System. Once the user has obtained elevated access, they may be able to take control of the system and perform actions otherwise reserved for high privileged users or system Administrators. Se presenta una vulnerabilidad en Origin Client que podría permitir a un usuario no administrativo elevar su acceso a Administrator o System. Una vez que el usuario ha obtenido un acceso elevado, ellos pueden ser capaces de tomar el control del sistema y llevar a cabo acciones que de otra manera estarían reservadas para usuarios con privilegios elevados o administradores del sistema • https://www.ea.com/security/news/easec-2020-002-elevation-of-privilege-vulnerability-in-origin-client • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Electronic Arts Origin 10.5.55.33574 is vulnerable to local privilege escalation due to arbitrary directory DACL manipulation, a different issue than CVE-2019-19247 and CVE-2019-19248. When Origin.exe connects to the named pipe OriginClientService, the privileged service verifies the client's executable file instead of its in-memory process (which can be significantly different from the executable file due to, for example, DLL injection). Data transmitted over the pipe is encrypted using a static key. Instead of hooking the pipe communication directly via WriteFileEx(), this can be bypassed by hooking the EVP_EncryptUpdate() function of libeay32.dll. The pipe takes the command CreateDirectory to create a directory and adjust the directory DACL. • https://medium.com/%40tobiasgyoerfi/ea-origin-10-5-55-33574-createdirectory-arbitrary-dacl-write-privilege-escalation-cve-2019-19741-5f18adfabb27 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Electronic Arts Origin through 10.5.x allows Elevation of Privilege (issue 2 of 2). Electronic Arts Origin versiones hasta 10.5.x, permite una Elevación de Privilegios (problema 2 de 2). • https://www.ea.com/security/news/easec-2019-001-elevation-of-privilege-vulnerability-in-origin-client •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Electronic Arts Origin through 10.5.x allows Elevation of Privilege (issue 1 of 2). Electronic Arts Origin versiones hasta 10.5.x, permite una Elevación de Privilegios problema 1 de 2). • https://www.ea.com/security/news/easec-2019-001-elevation-of-privilege-vulnerability-in-origin-client •