The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.
References
Link | Resource |
---|---|
https://explore.zoom.us/en/trust/security/security-bulletin | Vendor Advisory |
Configurations
History
16 Nov 2021, 19:42
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://explore.zoom.us/en/trust/security/security-bulletin - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.0
v3 : 9.0 |
CWE | CWE-22 | |
CPE | cpe:2.3:a:keybase:keybase:*:*:*:*:*:windows:*:* |
12 Nov 2021, 16:28
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-11-11 23:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-34422
Mitre link : CVE-2021-34422
CVE.ORG link : CVE-2021-34422
JSON object : View
Products Affected
keybase
- keybase
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')