CVE-2024-12908

Published: Dic 26, 2024 Last Modified: Ott 15, 2025 EU-VD ID: EUVD-2024-51186
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,9
Source: 1443cd92-d354-46d2-9290-d812316ca43a
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: required
Scope: changed
Confidentiality: high
Integrity: low
Availability: none

Description

AI Translation Available

Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version 6.0.3.26) where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a remote attacker may be able to convince a user to visit a malicious web-page, or open a
malicious document which could trigger the vulnerable handler, allowing them to execute
arbitrary code on the user's machine. Delinea added additional validation that the downloaded installer's batch file was in the expected format.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0004
Percentile
0,1th
Updated

EPSS Score Trend (Last 90 Days)

94

Improper Control of Generation of Code ('Code Injection')

Draft
Common Consequences
Security Scopes Affected:
Access Control Integrity Confidentiality Availability Non-Repudiation
Potential Impacts:
Bypass Protection Mechanism Gain Privileges Or Assume Identity Execute Unauthorized Code Or Commands Hide Activities
Applicable Platforms
Languages: Interpreted
Technologies: AI/ML
View CWE Details
Application

Secret Server by Delinea

Version Range Affected
To 11.9.000006 (exclusive)
cpe:2.3:a:delinea:secret_server:*:*:*:*:on-premises:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-h…
https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-h…
https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000…
https://trust.delinea.com/