Cryptomator through 1.6.5 allows DYLIB injection because, although it has the flag 0x1000 for Hardened Runtime, it has the com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables entitlements. An attacker can exploit this by creating a malicious .dylib file that can be executed via the DYLD_INSERT_LIBRARIES environment variable.
References
Link | Resource |
---|---|
https://cryptomator.org/ | Product Vendor Advisory |
https://medium.com/%40tehwinsam/cryptomator-1-6-5-dylib-injection-8004a1e90b26 | |
https://cryptomator.org/ | Product Vendor Advisory |
https://medium.com/%40tehwinsam/cryptomator-1-6-5-dylib-injection-8004a1e90b26 |
Configurations
History
21 Nov 2024, 06:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://cryptomator.org/ - Product, Vendor Advisory | |
References | () https://medium.com/%40tehwinsam/cryptomator-1-6-5-dylib-injection-8004a1e90b26 - |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-426 |
07 Mar 2022, 16:45
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-74 | |
CPE | cpe:2.3:a:cryptomator:cryptomator:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.8 |
References | (MISC) https://medium.com/@tehwinsam/cryptomator-1-6-5-dylib-injection-8004a1e90b26 - Exploit, Third Party Advisory | |
References | (MISC) https://cryptomator.org/ - Product, Vendor Advisory |
19 Feb 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-19 03:15
Updated : 2024-11-21 06:52
NVD link : CVE-2022-25366
Mitre link : CVE-2022-25366
CVE.ORG link : CVE-2022-25366
JSON object : View
Products Affected
cryptomator
- cryptomator
CWE
CWE-426
Untrusted Search Path