Mids' Reborn Hero Designer 2.6.0.7 downloads the update manifest, as well as update files, over cleartext HTTP. Additionally, the application does not perform file integrity validation for files after download. An attacker can perform a man-in-the-middle attack against this connection and replace executable files with malicious versions, which the operating system then executes under the context of the user running Hero Designer.
References
Link | Resource |
---|---|
https://www.doyler.net/security-not-included/mids-reborn-vulnerabilities | Exploit Third Party Advisory |
https://github.com/Crytilis/mids-reborn-hero-designer/releases | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-06-11 10:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-11614
Mitre link : CVE-2020-11614
JSON object : View
CWE
Products Affected
mids\'_reborn_hero_designer_project
- mids\'_reborn_hero_designer