Description
The SdcUser.TgConCtl ActiveX control in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance does not properly restrict access to the HTTPDownloadFile, HTTPGetFile, Install, and RunCmd methods, which allows remote attackers to execute arbitrary programs via a URL in the url argument to (1) HTTPDownloadFile or (2) HTTPGetFile.
Affected Software
{"id": "CVE-2010-1908", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2010-1908", "description": "The SdcUser.TgConCtl ActiveX control in tgctlcm.dll in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance does not properly restrict access to the HTTPDownloadFile, HTTPGetFile, Install, and RunCmd methods, which allows remote attackers to execute arbitrary programs via a URL in the url argument to (1) HTTPDownloadFile or (2) HTTPGetFile.", "published": "2010-05-12T11:46:00", "modified": "2018-10-10T19:57:00", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.3}, "severity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1908", "reporter": "cve@mitre.org", "references": ["http://www.wintercore.com/downloads/rootedcon_0day.pdf", "http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html", "http://secunia.com/advisories/39751", "http://www.kb.cert.org/vuls/id/602801", "http://www.securityfocus.com/archive/1/511176/100/0/threaded"], "cvelist": ["CVE-2010-1908"], "immutableFields": [], "lastseen": "2022-03-23T12:02:44", "viewCount": 10, "enchantments": {"dependencies": null, "score": {"value": 6.3, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 6.3}, "_state": {"dependencies": 0}, "_internal": {}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:consona:consona_dynamic_agent:-", "cpe:/a:consona:consona_live_assistance:*", "cpe:/a:consona:consona_subscriber_assistance:*"], "cpe23": ["cpe:2.3:a:consona:consona_live_assistance:*:*:*:*:*:*:*:*", "cpe:2.3:a:consona:consona_dynamic_agent:-:-:support:*:*:*:*:*", "cpe:2.3:a:consona:consona_dynamic_agent:-:-:marketing:*:*:*:*:*", "cpe:2.3:a:consona:consona_dynamic_agent:-:-:enterprise:*:*:*:*:*", "cpe:2.3:a:consona:consona_subscriber_assistance:*:*:*:*:*:*:*:*"], "cwe": ["CWE-264"], "affectedSoftware": [{"cpeName": "consona:consona_dynamic_agent", "version": "-", "operator": "eq", "name": "consona consona dynamic agent"}, {"cpeName": "consona:consona_dynamic_agent", "version": "-", "operator": "eq", "name": "consona consona dynamic agent"}, {"cpeName": "consona:consona_live_assistance", "version": "*", "operator": "eq", "name": "consona consona live assistance"}, {"cpeName": "consona:consona_dynamic_agent", "version": "-", "operator": "eq", "name": "consona consona dynamic agent"}, {"cpeName": "consona:consona_subscriber_assistance", "version": "*", "operator": "eq", "name": "consona consona subscriber assistance"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:consona:consona_dynamic_agent:-:-:marketing:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:consona:consona_dynamic_agent:-:-:support:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:consona:consona_live_assistance:*:*:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:consona:consona_dynamic_agent:-:-:enterprise:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:consona:consona_subscriber_assistance:*:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "http://www.wintercore.com/downloads/rootedcon_0day.pdf", "name": "http://www.wintercore.com/downloads/rootedcon_0day.pdf", "refsource": "MISC", "tags": ["Exploit"]}, {"url": "http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html", "name": "http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html", "refsource": "MISC", "tags": []}, {"url": "http://secunia.com/advisories/39751", "name": "39751", "refsource": "SECUNIA", "tags": ["Vendor Advisory"]}, {"url": "http://www.kb.cert.org/vuls/id/602801", "name": "VU#602801", "refsource": "CERT-VN", "tags": ["Patch", "US Government Resource"]}, {"url": "http://www.securityfocus.com/archive/1/511176/100/0/threaded", "name": "20100507 [Wintercore Research] Consona Products - Multiple vulnerabilities", "refsource": "BUGTRAQ", "tags": []}]}
{}