{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-12908","assignerOrgId":"1443cd92-d354-46d2-9290-d812316ca43a","state":"PUBLISHED","assignerShortName":"Delinea","dateReserved":"2024-12-23T16:24:16.226Z","datePublished":"2024-12-26T15:45:39.592Z","dateUpdated":"2024-12-27T14:22:58.318Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["Protocol Handler"],"product":"Secret Server","vendor":"Delinea","versions":[{"status":"affected","version":"11.7.31"}]}],"credits":[{"lang":"en","type":"reporter","value":"David Cash and Richard Warren of Amber Wolf"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Delinea a<span style=\"background-color: rgb(255, 255, 255);\">ddressed a reported case on Secret Server v11.7.31 (protocol handler version</span>&nbsp;6.0.3.26)<span style=\"background-color: rgb(255, 255, 255);\">&nbsp;where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a&nbsp;</span>remote attacker may be able to convince a user to visit a malicious web-page, or open a\nmalicious document which could trigger the vulnerable handler, allowing them to execute\narbitrary code on the user's machine.&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">Delinea a</span><span style=\"background-color: rgb(255, 255, 255);\">dded additional validation that the downloaded installer's batch file was in the expected format.</span><br>"}],"value":"Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version 6.0.3.26) where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a remote attacker may be able to convince a user to visit a malicious web-page, or open a\nmalicious document which could trigger the vulnerable handler, allowing them to execute\narbitrary code on the user's machine. Delinea added additional validation that the downloaded installer's batch file was in the expected format."}],"impacts":[{"capecId":"CAPEC-242","descriptions":[{"lang":"en","value":"CAPEC-242 Code Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"1443cd92-d354-46d2-9290-d812316ca43a","shortName":"Delinea","dateUpdated":"2024-12-26T15:45:39.592Z"},"references":[{"tags":["release-notes"],"url":"https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000049.htm"},{"tags":["vendor-advisory"],"url":"https://trust.delinea.com/"},{"tags":["third-party-advisory"],"url":"https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"references":[{"url":"https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-27T14:22:42.484455Z","id":"CVE-2024-12908","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-27T14:22:58.318Z"}}]}}