SB2019042004 - Code Injection in Origin Client
Published: April 20, 2019 Updated: August 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Code Injection (CVE-ID: CVE-2019-11354)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.
Remediation
Install update from vendor's website.
References
- http://gamasutra.com/view/news/340907/A_nowfixed_Origin_vulnerability_potentially_opened_the_client_to_hackers.php
- http://packetstormsecurity.com/files/153375/dotProject-2.1.9-SQL-Injection.html
- http://packetstormsecurity.com/files/153485/EA-Origin-Template-Injection-Remote-Code-Execution.html
- https://blog.underdogsecurity.com/rce_in_origin_client/
- https://gizmodo.com/ea-origin-users-update-your-client-now-1834079604
- https://techcrunch.com/2019/04/16/ea-origin-bug-exposed-hackers/
- https://www.golem.de/news/sicherheitsluecke-ea-origin-fuehrte-schadcode-per-link-aus-1904-140738.html
- https://www.pcmag.com/news/367801/security-flaw-allowed-any-app-to-run-using-eas-origin-clien
- https://www.techradar.com/news/major-security-flaw-found-in-ea-origin-gaming-client
- https://www.thesun.co.uk/tech/8877334/sims-4-battlefield-fifa-origin-hackers/
- https://www.trustedreviews.com/news/time-update-origin-eas-game-client-security-risk-just-installed-3697942
- https://www.vg247.com/2019/04/17/ea-origin-security-flaw-run-malicious-code-fixed/