An issue was discovered in DigDash 2018R2 before p20200528, 2019R1 before p20200421, and 2019R2 before p20200430. It allows a user to provide data that will be used to generate the JNLP file used by a client to obtain the right Java application. By providing an attacker-controlled URL, the client will obtain a rogue JNLP file specifying the installation of malicious JAR archives and executed with full privileges on the client computer.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-5893 An issue was discovered in DigDash 2018R2 before p20200528, 2019R1 before p20200421, and 2019R2 before p20200430. It allows a user to provide data that will be used to generate the JNLP file used by a client to obtain the right Java application. By providing an attacker-controlled URL, the client will obtain a rogue JNLP file specifying the installation of malicious JAR archives and executed with full privileges on the client computer.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T12:25:16.192Z

Reserved: 2020-05-28T00:00:00

Link: CVE-2020-13651

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-15T19:15:10.043

Modified: 2024-11-21T05:01:40.913

Link: CVE-2020-13651

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.