Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-12908

Summary
Assigner-Delinea
Assigner Org ID-1443cd92-d354-46d2-9290-d812316ca43a
Published At-26 Dec, 2024 | 15:45
Updated At-27 Dec, 2024 | 14:22
Rejected At-
Credits

Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version 6.0.3.26) where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a remote attacker may be able to convince a user to visit a malicious web-page, or open a malicious document which could trigger the vulnerable handler, allowing them to execute arbitrary code on the user's machine. Delinea added additional validation that the downloaded installer's batch file was in the expected format.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Delinea
Assigner Org ID:1443cd92-d354-46d2-9290-d812316ca43a
Published At:26 Dec, 2024 | 15:45
Updated At:27 Dec, 2024 | 14:22
Rejected At:
▼CVE Numbering Authority (CNA)

Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version 6.0.3.26) where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a remote attacker may be able to convince a user to visit a malicious web-page, or open a malicious document which could trigger the vulnerable handler, allowing them to execute arbitrary code on the user's machine. Delinea added additional validation that the downloaded installer's batch file was in the expected format.

Affected Products
Vendor
Delinea
Product
Secret Server
Modules
  • Protocol Handler
Default Status
unaffected
Versions
Affected
  • 11.7.31
Problem Types
TypeCWE IDDescription
CWECWE-94CWE-94 Improper Control of Generation of Code ('Code Injection')
Type: CWE
CWE ID: CWE-94
Description: CWE-94 Improper Control of Generation of Code ('Code Injection')
Metrics
VersionBase scoreBase severityVector
3.16.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
Version: 3.1
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-242CAPEC-242 Code Injection
CAPEC ID: CAPEC-242
Description: CAPEC-242 Code Injection
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
David Cash and Richard Warren of Amber Wolf
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000049.htm
release-notes
https://trust.delinea.com/
vendor-advisory
https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/
third-party-advisory
Hyperlink: https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000049.htm
Resource:
release-notes
Hyperlink: https://trust.delinea.com/
Resource:
vendor-advisory
Hyperlink: https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/
exploit
Hyperlink: https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/
Resource:
exploit
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:1443cd92-d354-46d2-9290-d812316ca43a
Published At:26 Dec, 2024 | 16:15
Updated At:27 Dec, 2024 | 15:15

Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version 6.0.3.26) where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a remote attacker may be able to convince a user to visit a malicious web-page, or open a malicious document which could trigger the vulnerable handler, allowing them to execute arbitrary code on the user's machine. Delinea added additional validation that the downloaded installer's batch file was in the expected format.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-94Secondary1443cd92-d354-46d2-9290-d812316ca43a
CWE ID: CWE-94
Type: Secondary
Source: 1443cd92-d354-46d2-9290-d812316ca43a
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/1443cd92-d354-46d2-9290-d812316ca43a
N/A
https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000049.htm1443cd92-d354-46d2-9290-d812316ca43a
N/A
https://trust.delinea.com/1443cd92-d354-46d2-9290-d812316ca43a
N/A
https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/134c704f-9b21-4f2e-91b3-4a467353bcc0
N/A
Hyperlink: https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/
Source: 1443cd92-d354-46d2-9290-d812316ca43a
Resource: N/A
Hyperlink: https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000049.htm
Source: 1443cd92-d354-46d2-9290-d812316ca43a
Resource: N/A
Hyperlink: https://trust.delinea.com/
Source: 1443cd92-d354-46d2-9290-d812316ca43a
Resource: N/A
Hyperlink: https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found