Description
Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client.
Problem types
CWE-295 Improper certificate validation
CWE-296 Improper following of a certificate's chain of trust
CWE-494 Download of code without integrity check
Product status
Any version before 1.3.674
Credits
Daniel Hirschberger, SEC Consult Vulnerability Lab
Thorger Jansen, SEC Consult Vulnerability Lab
Tobias Niemann, SEC Consult Vulnerability Lab
Marius Renner, SEC Consult Vulnerability Lab
References
sec-consult.com/...ing-to-rce-in-desktime-time-tracking-app/
r.sec-consult.com/desktime
desktime.com/download