Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers.
References
Link | Resource |
---|---|
https://blog.installbuilder.com/2021/10/installbuilder-2160-released.html | Release Notes Vendor Advisory |
https://blog.installbuilder.com/2021/10/installbuilder-2160-released.html | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 05:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.installbuilder.com/2021/10/installbuilder-2160-released.html - Release Notes, Vendor Advisory |
03 Nov 2021, 18:23
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-427 | |
CPE | cpe:2.3:a:vmware:installbuilder:*:*:*:*:*:windows:*:* | |
CVSS |
v2 : v3 : |
v2 : 4.4
v3 : 7.8 |
References | (MISC) https://blog.installbuilder.com/2021/10/installbuilder-2160-released.html - Release Notes, Vendor Advisory |
29 Oct 2021, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-29 12:15
Updated : 2024-11-21 05:49
NVD link : CVE-2021-22037
Mitre link : CVE-2021-22037
CVE.ORG link : CVE-2021-22037
JSON object : View
Products Affected
vmware
- installbuilder
CWE
CWE-427
Uncontrolled Search Path Element