In Real Player 20.0.8.310, the G2 Control allows injection of unsafe javascript: URIs in local HTTP error pages (displayed by Internet Explorer core). This leads to arbitrary code execution.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/Edubr2020/RealPlayer_G2_RCE | third party advisory exploit |
https://www.youtube.com/watch?v=9c9Q4VZQOUk | third party advisory exploit |