- Description
- The SdcUser.TgConCtl ActiveX control in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance does not properly restrict access to the HTTPDownloadFile, HTTPGetFile, Install, and RunCmd methods, which allows remote attackers to execute arbitrary programs via a URL in the url argument to (1) HTTPDownloadFile or (2) HTTPGetFile.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- nvd@nist.gov
- CWE-264
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:consona:consona_dynamic_agent:-:-:enterprise:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3E86DC4D-1E5C-4284-AA49-FD5F3AA9056A"
},
{
"criteria": "cpe:2.3:a:consona:consona_dynamic_agent:-:-:marketing:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "76A93E2B-D458-43A4-A4A5-9FA0981B72EF"
},
{
"criteria": "cpe:2.3:a:consona:consona_dynamic_agent:-:-:support:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F1AAF4CD-3D1A-4C44-8338-4F614E4645CB"
},
{
"criteria": "cpe:2.3:a:consona:consona_live_assistance:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EDD3CC62-BB8B-435F-A9F3-CD6DE608F463"
},
{
"criteria": "cpe:2.3:a:consona:consona_subscriber_assistance:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1F445B64-34D5-4372-9861-2216442E4069"
}
],
"operator": "OR"
}
]
}
]