vendor:
mIRC
by:
proofofcalc
8.1
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: mIRC
Affected Version From: < 7.55
Affected Version To: < 7.55
Patch Exists: YES
Related CWE: CVE-2019-6453
CPE: a:mirc:mirc
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows
2019
RCE on mIRC <7.55 using argument injection through custom URI protocol handlers
mIRC has been shown to be vulnerable to argument injection through its associated URI protocol handlers that improperly escape their parameters. Using available command-line parameters, an attacker is able to load a remote configuration file and to automatically run arbitrary code. Because mIRC doesn't use any kind of sigil such as -- to mark the end of the argument list, an attacker is able to pass arguments to mIRC through a irc:// link and execute arbitrary code by loading a custom mirc.ini from an attacker-controlled Samba file server. Please note that ircs:// works the same way.
Mitigation:
Ensure that the application properly escapes user-supplied input and that it does not allow arbitrary command execution.