CVE-2019-11354
dotProject 2.1.9 - SQL Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
5Exploited in Wild
-Decision
Descriptions
The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.
El cliente de Electronic Arts (EA) Origin versión 10.5.36 en Windows permite la inyección de plantillas en el parámetro title del controlador URI de Origin2. Esto se puede utilizar para escapar del entorno limitado AngularJS subyacente y lograr la ejecución remota de código a través de una dirección URL origin2://game/launch para la comunicación QtApplication QDesktopServices.
EA Origin versions prior to 10.5.36 suffer from a remote code execution vulnerability via template injection leveraging cross site scripting.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-04-19 CVE Reserved
- 2019-04-19 CVE Published
- 2019-06-24 First Exploit
- 2024-08-04 CVE Updated
- 2024-09-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
References (13)
URL | Date | SRC |
---|
URL | Date | SRC |
---|