Vulnerability Name: | CVE-2022-32271 (CCN-227783) | ||||||||||||
Assigned: | 2022-06-01 | ||||||||||||
Published: | 2022-06-01 | ||||||||||||
Updated: | 2022-06-13 | ||||||||||||
Summary: | In Real Player 20.0.8.310, there is a DCP:// URI Remote Arbitrary Code Execution Vulnerability. This is an internal URL Protocol used by Real Player to reference a file that contains an URL. It is possible to inject script code to arbitrary domains. It is also possible to reference arbitrary local files. | ||||||||||||
CVSS v3 Severity: | 9.6 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) 8.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:U/RC:R)
8.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-79 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-32271 Source: XF Type: UNKNOWN realplayer-dcpuri-code-exec(227783) Source: CCN Type: GitHub Web site Real Player 'DCP://' URI Remote Arbitrary Code Execution Vulnerability Source: MISC Type: Exploit, Third Party Advisory https://github.com/Edubr2020/RP_DCP_Code_Exec Source: CCN Type: Packet Storm Security [06-01-2022] Real Player 16.0.3.51 / Cloud 17.0.9.17 / 20.0.7.309 DCP URI Remote Code Execution Source: CCN Type: RealNetworks Web site RealPlayer and RealPlayer Cloud Source: MISC Type: Exploit, Third Party Advisory https://youtu.be/AMODp3iTnqY | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |