Advisory Details

February 20th, 2019

Malwarebytes Antimalware URI Handler Remote Command Execution Vulnerability

ZDI-19-223
ZDI-CAN-7162

CVE ID CVE-2019-6739
CVSS SCORE 8.8, (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
AFFECTED VENDORS Malwarebytes
AFFECTED PRODUCTS Antimalware
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Malwarebytes Anti-Malware. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.

There is an issue with the way the product handles URIs within certain schemes. The product does not warn the user that a dangerous navigation is about to take place. Because special characters in the URI are not sanitized, this could lead to the execution of arbitrary commands. An attacker can leverage this vulnerability to execute code in the context of the current user at medium integrity.

ADDITIONAL DETAILS

This vulnerability report was resolved by builds including and after 3.6.1.2711-1.0.508.


DISCLOSURE TIMELINE
  • 2018-10-25 - Vulnerability reported to vendor
  • 2019-02-20 - Coordinated public release of advisory
  • 2019-05-29 - Advisory Updated
CREDIT rgod of 9sg Security Team - rgod@9sgsec.com
BACK TO ADVISORIES