Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://www.vg247.com/2019/04/17/ea-origin-security-flaw-run-malicious-code-fixed/", "name": "https://www.vg247.com/2019/04/17/ea-origin-security-flaw-run-malicious-code-fixed/", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://www.trustedreviews.com/news/time-update-origin-eas-game-client-security-risk-just-installed-3697942", "name": "https://www.trustedreviews.com/news/time-update-origin-eas-game-client-security-risk-just-installed-3697942", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://www.thesun.co.uk/tech/8877334/sims-4-battlefield-fifa-origin-hackers/", "name": "https://www.thesun.co.uk/tech/8877334/sims-4-battlefield-fifa-origin-hackers/", "tags": ["Press/Media Coverage", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://www.techradar.com/news/major-security-flaw-found-in-ea-origin-gaming-client", "name": "https://www.techradar.com/news/major-security-flaw-found-in-ea-origin-gaming-client", "tags": ["Press/Media Coverage", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://www.pcmag.com/news/367801/security-flaw-allowed-any-app-to-run-using-eas-origin-clien", "name": "https://www.pcmag.com/news/367801/security-flaw-allowed-any-app-to-run-using-eas-origin-clien", "tags": ["Press/Media Coverage", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://www.golem.de/news/sicherheitsluecke-ea-origin-fuehrte-schadcode-per-link-aus-1904-140738.html", "name": "https://www.golem.de/news/sicherheitsluecke-ea-origin-fuehrte-schadcode-per-link-aus-1904-140738.html", "tags": ["Press/Media Coverage", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://techcrunch.com/2019/04/16/ea-origin-bug-exposed-hackers/", "name": "https://techcrunch.com/2019/04/16/ea-origin-bug-exposed-hackers/", "tags": ["Exploit", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://gizmodo.com/ea-origin-users-update-your-client-now-1834079604", "name": "https://gizmodo.com/ea-origin-users-update-your-client-now-1834079604", "tags": ["Exploit", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://blog.underdogsecurity.com/rce_in_origin_client/", "name": "https://blog.underdogsecurity.com/rce_in_origin_client/", "tags": ["Broken Link"], "refsource": "MISC"}, {"url": "http://gamasutra.com/view/news/340907/A_nowfixed_Origin_vulnerability_potentially_opened_the_client_to_hackers.php", "name": "http://gamasutra.com/view/news/340907/A_nowfixed_Origin_vulnerability_potentially_opened_the_client_to_hackers.php", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "http://packetstormsecurity.com/files/153375/dotProject-2.1.9-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/153375/dotProject-2.1.9-SQL-Injection.html", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "refsource": "MISC"}, {"url": "http://packetstormsecurity.com/files/153485/EA-Origin-Template-Injection-Remote-Code-Execution.html", "name": "http://packetstormsecurity.com/files/153485/EA-Origin-Template-Injection-Remote-Code-Execution.html", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-74"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2019-11354", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "acInsufInfo": false, "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}}, "publishedDate": "2019-04-19T22:29Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:ea:origin:10.5.36:*:*:*:*:windows:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2022-04-18T17:08Z"}