The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://explore.zoom.us/en/trust/security/security-bulletin |
History
No history.
MITRE
Status: PUBLISHED
Assigner: Zoom
Published: 2021-11-11T22:58:22.996455Z
Updated: 2024-09-17T03:12:21.549Z
Reserved: 2021-06-09T00:00:00
Link: CVE-2021-34422
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-11-11T23:15:10.143
Modified: 2024-11-21T06:10:22.270
Link: CVE-2021-34422
Redhat
No data.