// For flags

CVE-2024-12908

 

Severity Score

6.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version 6.0.3.26) where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a remote attacker may be able to convince a user to visit a malicious web-page, or open a
malicious document which could trigger the vulnerable handler, allowing them to execute
arbitrary code on the user's machine. Delinea added additional validation that the downloaded installer's batch file was in the expected format.

Delinea abordó un caso informado en Secret Server v11.7.31 (versión del controlador de protocolo 6.0.3.26) donde, dentro de la función del controlador de protocolo, se compararon las URL antes de la normalización y la canonización, lo que potencialmente llevó a una coincidencia excesiva con la lista aprobada. Si este ataque se explotara con éxito, un atacante remoto podría convencer a un usuario de visitar una página web maliciosa o abrir un documento malicioso que podría activar el controlador vulnerable, lo que le permitiría ejecutar código arbitrario en la máquina del usuario. Delinea agregó una validación adicional de que el archivo por lotes del instalador descargado estaba en el formato esperado.

Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version 6.0.3.26) where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a remote attacker may be able to convince a user to visit a malicious web-page, or open a malicious document which could trigger the vulnerable handler, allowing them to execute arbitrary code on the user's machine. Delinea added additional validation that the downloaded installer's batch file was in the expected format.

*Credits: David Cash and Richard Warren of Amber Wolf
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Complete
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
Poc
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-12-23 CVE Reserved
  • 2024-12-26 CVE Published
  • 2024-12-27 CVE Updated
  • 2024-12-27 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
  • CAPEC-242: Code Injection
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Delinea
Search vendor "Delinea"
Secret Server
Search vendor "Delinea" for product "Secret Server"
11.7.31
Search vendor "Delinea" for product "Secret Server" and version "11.7.31"
en
Affected