RULE(RULE ID:321788)

Rule General Information
Release Date: 2019-06-06
Rule Name: mIRC URI Handler Remote Code Execution Vulnerability -1 (CVE-2019-6453)
Severity:
CVE ID:
Rule Protection Details
Description: mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable).
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: ExploitDB:46392
https://github.com/proofofcalc/cve-2019-6453-poc
https://proofofcalc.com/advisories/20190218.txt
https://proofofcalc.com/cve-2019-6453-mIRC/
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://www.mirc.com/news.html