Логотип exploitDog
bind:CVE-2021-22037
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-22037

Количество 3

Количество 3

nvd логотип

CVE-2021-22037

больше 4 лет назад

Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-jv5m-f67h-gh5c

больше 3 лет назад

Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers.

EPSS: Низкий
fstec логотип

BDU:2021-05728

больше 4 лет назад

Уязвимость утилиты командной строки reg.exe инструмента для разработки и автоматического обновления установщиков VMware InstallBuilder для операционных систем Windows, позволяющая нарушителю выполнить произвольные команды

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-22037

Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers.

CVSS3: 7.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-jv5m-f67h-gh5c

Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-05728

Уязвимость утилиты командной строки reg.exe инструмента для разработки и автоматического обновления установщиков VMware InstallBuilder для операционных систем Windows, позволяющая нарушителю выполнить произвольные команды

CVSS3: 7.8
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу