Description
The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21080 | The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution. |
References
| Link | Providers |
|---|---|
| https://explore.zoom.us/en/trust/security/security-bulletin |
|
History
No history.
Status: PUBLISHED
Assigner: Zoom
Published:
Updated: 2024-09-17T03:12:21.549Z
Reserved: 2021-06-09T00:00:00.000Z
Link: CVE-2021-34422
No data.
Status : Modified
Published: 2021-11-11T23:15:10.143
Modified: 2024-11-21T06:10:22.270
Link: CVE-2021-34422
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD