Skip to content

Immunity Inc. Advisories Repository

Notifications You must be signed in to change notification settings

immunityinc/Advisories

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

Advisories

2020

CVE-2020-13172

Title: Origin Information Disclosure
Vendors contacted: Electronic Arts Inc.
Release mode: Coordinated Release
Credits: This vulnerability was discovered by Andres Blanco.
Class: Insertion of Sensitive Information Into Debugging Code [CWE-215]
Severity: Medium - 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N 5.5)
Summary: A Information Disclosure vulnerability is present within the ‘Origin.exe’ process, this kind of attack allows local malicious users to access sensitive user information.

Full Report

CVE-2020-15524

Title: Local Privilege Escalation in Origin
Vendors contacted: Electronic Arts Inc.
Release mode: Coordinated Release
Credits: This vulnerability was discovered by Joel Noguera in collaboration with Lautaro Fain.
Class: Uncontrolled Search Path Element [CWE-427]
Severity: High - 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Summary: A Local Privilege Escalation attack scenario is present within the ‘OriginClientService.exe’ process, this kind of attack allows malicious users to elevate privileges within the target system and therefore perform actions that otherwise they would not be able to execute. In this particular case, attackers will be able to escalate from a Windows Non-Privileged user to NT AUTHORITY/SYSTEM by planting a DLL in a Qt Path on which they have control.

Full Report

CVE-2020-24350

Title: Path Traversal vulnerability in AppVeyor Server
Vendors contacted: AppVeyor
Release mode: Coordinated Release
Credits: This vulnerability was discovered by Julian Muñoz in collaboration with Joshua Domangue.
Class: Path Traversal [CWE-35]
Severity: High - 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
Summary: Immunity discovered a vulnerability in AppVeyor server, which can be exploited to view contents of arbitrary files on the local system. An attacker might be able to obtain potentially sensitive or system information, and even compromise the vulnerable system.

Full Report

CVE-2020-25214

Title: Unauthenticated Remote Code Execution in OverwolfUpdater
Vendors contacted: Overwolf Ltd
Release mode: Coordinated Release
Credits: This vulnerability was discovered by Joel Noguera.
Class: Channel Accessible by Non-Endpoint [CWE-300]
Severity: High - 8.8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Summary: An Unauthenticated Remote Code Execution attack scenario is present within the 'OverwolfUpdater.exe' service. This attack allows malicious users on the same network or positioned in between the user and the remote server to execute code within the target system as the user 'NT AUTHORITY/SYSTEM' and therefore obtaining complete access and control of the machine.

Full Report

CVE-2020-25769

Title: Local Privilege Escalation in GOG Galaxy
Vendors contacted: GOG.com
Release mode: Coordinated Release
Credits: This vulnerability was discovered by Juan Pablo De Francesco.
Class: Incorrect Default Permissions [CWE-276]
Severity: High - 8.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)
Summary: An exploitable local privilege escalation vulnerability exists in GOG Galaxy Windows client. During the usual workflow the Windows client relies on the GalaxyClientService component for handling privileged tasks. On a typical installation, that service is installed and configured to run under a local system account and the presented vulnerability affects this component.

Full Report

About

Immunity Inc. Advisories Repository

Topics

Resources

Stars

Watchers

Forks