Ubisoft uPlay < 2.0.4 Browser Plugin RCE

high Nessus Plugin ID 100961

Synopsis

A game launcher application installed on the host is affected by a remote code execution vulnerability.

Description

According to its version number, the Ubisoft uPlay application installed on the remote host is prior to 2.0.4. It is, therefore, affected by a remote code execution vulnerability in the web browser plugin due to improper validation of user-supplied input passed via the '-orbit_exe_path' command line argument. An unauthenticated, remote attacker can exploit this, via a specially crafted website, to execute arbitrary code.

Solution

Upgrade to Ubisoft uPlay version 2.0.4 or later.

See Also

http://www.nessus.org/u?83487ab3

https://seclists.org/fulldisclosure/2012/Jul/375

Plugin Details

Severity: High

ID: 100961

File Name: ubisoft_uplay_rce.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 6/21/2017

Updated: 11/13/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2012-4177

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ubi:uplay_pc

Required KB Items: installed_sw/Ubisoft uPlay

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/30/2012

Vulnerability Publication Date: 7/29/2012

Exploitable With

Metasploit (Ubisoft uplay 2.0.3 ActiveX Control Arbitrary Code Execution)

Reference Information

CVE: CVE-2012-4177

BID: 54867