Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rr44-rmpx-9h3q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.

The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.

EPSS

Процентиль: 55%
0.00329
Низкий

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.2
nvd
около 4 лет назад

The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.

CVSS3: 7.2
fstec
около 4 лет назад

Уязвимость клиента каталога открытых ключей Keybase для Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 55%
0.00329
Низкий

Дефекты

CWE-22