CVE-2022-32270

In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs because it is possible to plant executables in the startup folder (DLL planting could also occur).
References
Link Resource
https://github.com/Edubr2020/RP_Import_RCE Exploit Third Party Advisory
https://youtu.be/CONlijEgDLc Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:realnetworks:realplayer:20.0.7.309:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:20.0.8.310:*:*:*:*:*:*:*

History

12 Jun 2022, 03:19

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-22
References (MISC) https://github.com/Edubr2020/RP_Import_RCE - (MISC) https://github.com/Edubr2020/RP_Import_RCE - Exploit, Third Party Advisory
References (MISC) https://youtu.be/CONlijEgDLc - (MISC) https://youtu.be/CONlijEgDLc - Exploit, Third Party Advisory
CPE cpe:2.3:a:realnetworks:realplayer:20.0.8.310:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:20.0.7.309:*:*:*:*:*:*:*
First Time Realnetworks realplayer
Realnetworks

03 Jun 2022, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-03 06:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-32270

Mitre link : CVE-2022-32270

CVE.ORG link : CVE-2022-32270


JSON object : View

Products Affected

realnetworks

  • realplayer
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')