Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: vmware
Published: 2021-10-29T11:09:07
Updated: 2024-08-03T18:30:24.009Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-22037
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-10-29T12:15:07.573
Modified: 2024-11-21T05:49:28.823
Link: CVE-2021-22037
Redhat
No data.