Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published: 2021-10-29T11:09:07

Updated: 2024-08-03T18:30:24.009Z

Reserved: 2021-01-04T00:00:00

Link: CVE-2021-22037

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-29T12:15:07.573

Modified: 2024-11-21T05:49:28.823

Link: CVE-2021-22037

cve-icon Redhat

No data.