8 results (0.001 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

In Openshift Origin 3 the cookies being set in console have no 'secure', 'HttpOnly' attributes. En Openshift Origin 3 las cookies que son establecidas en la consola no presentan atributos "secure", "HttpOnly" • https://bugzilla.redhat.com/show_bug.cgi?id=1221882 https://github.com/openshift/origin/pull/2261 https://github.com/openshift/origin/pull/2291 • CWE-311: Missing Encryption of Sensitive Data CWE-614: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability exists in the Origin Client that could allow a non-Administrative user to elevate their access to either Administrator or System. Once the user has obtained elevated access, they may be able to take control of the system and perform actions otherwise reserved for high privileged users or system Administrators. Se presenta una vulnerabilidad en Origin Client que podría permitir a un usuario no administrativo elevar su acceso a Administrator o System. Una vez que el usuario ha obtenido un acceso elevado, ellos pueden ser capaces de tomar el control del sistema y llevar a cabo acciones que de otra manera estarían reservadas para usuarios con privilegios elevados o administradores del sistema • https://www.ea.com/security/news/easec-2020-002-elevation-of-privilege-vulnerability-in-origin-client • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Electronic Arts Origin 10.5.55.33574 is vulnerable to local privilege escalation due to arbitrary directory DACL manipulation, a different issue than CVE-2019-19247 and CVE-2019-19248. When Origin.exe connects to the named pipe OriginClientService, the privileged service verifies the client's executable file instead of its in-memory process (which can be significantly different from the executable file due to, for example, DLL injection). Data transmitted over the pipe is encrypted using a static key. Instead of hooking the pipe communication directly via WriteFileEx(), this can be bypassed by hooking the EVP_EncryptUpdate() function of libeay32.dll. The pipe takes the command CreateDirectory to create a directory and adjust the directory DACL. • https://medium.com/%40tobiasgyoerfi/ea-origin-10-5-55-33574-createdirectory-arbitrary-dacl-write-privilege-escalation-cve-2019-19741-5f18adfabb27 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Electronic Arts Origin through 10.5.x allows Elevation of Privilege (issue 2 of 2). Electronic Arts Origin versiones hasta 10.5.x, permite una Elevación de Privilegios (problema 2 de 2). • https://www.ea.com/security/news/easec-2019-001-elevation-of-privilege-vulnerability-in-origin-client •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Electronic Arts Origin through 10.5.x allows Elevation of Privilege (issue 1 of 2). Electronic Arts Origin versiones hasta 10.5.x, permite una Elevación de Privilegios problema 1 de 2). • https://www.ea.com/security/news/easec-2019-001-elevation-of-privilege-vulnerability-in-origin-client •