Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wv5q-x2gm-xf7j

Опубликовано: 13 мая 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7
CVSS3: 7.3

Описание

conda-forge openssl-feedstock before 066e83c (2024-05-20), on Microsoft Windows, configures OpenSSL to use an OPENSSLDIR file path that can be written to by non-privilged local users. By writing a specially crafted openssl.cnf file in OPENSSLDIR, a non-privileged local user can execute arbitrary code with the privileges of the user or process loading openssl-feedstock DLLs. Miniforge before 24.5.0 is also affected.

conda-forge openssl-feedstock before 066e83c (2024-05-20), on Microsoft Windows, configures OpenSSL to use an OPENSSLDIR file path that can be written to by non-privilged local users. By writing a specially crafted openssl.cnf file in OPENSSLDIR, a non-privileged local user can execute arbitrary code with the privileges of the user or process loading openssl-feedstock DLLs. Miniforge before 24.5.0 is also affected.

EPSS

Процентиль: 4%
0.00019
Низкий

7 High

CVSS4

7.3 High

CVSS3

Дефекты

CWE-427

Связанные уязвимости

CVSS3: 7.3
nvd
9 месяцев назад

conda-forge openssl-feedstock before 066e83c (2024-05-20), on Microsoft Windows, configures OpenSSL to use an OPENSSLDIR file path that can be written to by non-privilged local users. By writing a specially crafted openssl.cnf file in OPENSSLDIR, a non-privileged local user can execute arbitrary code with the privileges of the user or process loading openssl-feedstock DLLs. Miniforge before 24.5.0 is also affected.

EPSS

Процентиль: 4%
0.00019
Низкий

7 High

CVSS4

7.3 High

CVSS3

Дефекты

CWE-427