Overview
- Description
- In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs because it is possible to plant executables in the startup folder (DLL planting could also occur).
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-22
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:realnetworks:realplayer:20.0.7.309:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9AC83C3-55F0-498F-A2B5-480012F73A6B" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:20.0.8.310:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E86C53C2-37F0-40AC-BB65-0E36850C5487" } ], "operator": "OR" } ] } ]