First published: Thu Aug 15 2019(Updated: )
An issue was discovered in in TortoiseSVN 1.12.1. The Tsvncmd: URI handler allows a customised diff operation on Excel workbooks, which could be used to open remote workbooks without protection from macro security settings to execute arbitrary code. A tsvncmd:command:diff?path:[file1]?path2:[file2] URI will execute a customised diff on [file1] and [file2] based on the file extension. For xls files, it will execute the script diff-xls.js using wscript, which will open the two files for analysis without any macro security warning. An attacker can exploit this by putting a macro virus in a network drive, and force the victim to open the workbooks and execute the macro inside.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exoticpetnetwork Tortoise Forum | =1.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14422 has been classified as a critical vulnerability due to its potential to execute arbitrary code.
To remediate CVE-2019-14422, it is recommended to upgrade TortoiseSVN to version 1.12.2 or later.
CVE-2019-14422 affects TortoiseSVN version 1.12.1.
The primary risk of CVE-2019-14422 is that an attacker could exploit it to open remote Excel workbooks and execute malicious macros.
CVE-2019-14422 allows remote code execution through a customized diff operation in the tsvncmd URI handler without adequate macro security.