CVE-2022-32270
Summary
| CVE | CVE-2022-32270 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-06-03 06:15:00 UTC |
| Updated | 2022-06-12 03:19:00 UTC |
| Description | In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs because it is possible to plant executables in the startup folder (DLL planting could also occur). |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Realnetworks | Realplayer | 20.0.7.309 | All | All | All |
| Application | Realnetworks | Realplayer | 20.0.8.310 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Real Player 'external::Import()' Vulnerabilities leads to Remote Code Execution - YouTube | MISC | youtu.be | |
| GitHub - Edubr2020/RP_Import_RCE | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.