Description
An issue was discovered in DigDash 2018R2 before p20200528, 2019R1 before p20200421, and 2019R2 before p20200430. It allows a user to provide data that will be used to generate the JNLP file used by a client to obtain the right Java application. By providing an attacker-controlled URL, the client will obtain a rogue JNLP file specifying the installation of malicious JAR archives and executed with full privileges on the client computer.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-5893 | An issue was discovered in DigDash 2018R2 before p20200528, 2019R1 before p20200421, and 2019R2 before p20200430. It allows a user to provide data that will be used to generate the JNLP file used by a client to obtain the right Java application. By providing an attacker-controlled URL, the client will obtain a rogue JNLP file specifying the installation of malicious JAR archives and executed with full privileges on the client computer. |
References
| Link | Providers |
|---|---|
| https://know.bishopfox.com/advisories/digdash-version-2018 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:25:16.192Z
Reserved: 2020-05-28T00:00:00.000Z
Link: CVE-2020-13651
No data.
Status : Modified
Published: 2020-06-15T19:15:10.043
Modified: 2024-11-21T05:01:40.913
Link: CVE-2020-13651
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD