The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-21080 The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zoom

Published:

Updated: 2024-09-17T03:12:21.549Z

Reserved: 2021-06-09T00:00:00

Link: CVE-2021-34422

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-11-11T23:15:10.143

Modified: 2024-11-21T06:10:22.270

Link: CVE-2021-34422

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.