The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21080 | The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://explore.zoom.us/en/trust/security/security-bulletin |
|
History
No history.
Status: PUBLISHED
Assigner: Zoom
Published:
Updated: 2024-09-17T03:12:21.549Z
Reserved: 2021-06-09T00:00:00.000Z
Link: CVE-2021-34422
No data.
Status : Modified
Published: 2021-11-11T23:15:10.143
Modified: 2024-11-21T06:10:22.270
Link: CVE-2021-34422
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD