Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version 6.0.3.26) where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a remote attacker may be able to convince a user to visit a malicious web-page, or open a
malicious document which could trigger the vulnerable handler, allowing them to execute
arbitrary code on the user's machine. Delinea added additional validation that the downloaded installer's batch file was in the expected format.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 26 Dec 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version 6.0.3.26) where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a remote attacker may be able to convince a user to visit a malicious web-page, or open a malicious document which could trigger the vulnerable handler, allowing them to execute arbitrary code on the user's machine. Delinea added additional validation that the downloaded installer's batch file was in the expected format. | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Delinea
Published: 2024-12-26T15:45:39.592Z
Updated: 2024-12-27T14:22:58.318Z
Reserved: 2024-12-23T16:24:16.226Z
Link: CVE-2024-12908
Vulnrichment
Updated: 2024-12-27T14:22:53.898Z
NVD
Status : Received
Published: 2024-12-26T16:15:06.050
Modified: 2024-12-27T15:15:10.240
Link: CVE-2024-12908
Redhat
No data.