In Real Player 20.0.7.309 and 20.0.8.310, external:...
Critical severity
Unreviewed
Published
Jun 4, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Jun 3, 2022
Published to the GitHub Advisory Database
Jun 4, 2022
Last updated
Jan 27, 2023
In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs because it is possible to plant executables in the startup folder (DLL planting could also occur).
References