All versions of package masuit.tools.core are vulnerable to Arbitrary Code Execution via the ReceiveVarData<T> function in the SocketClient.cs component. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-5356 All versions of package masuit.tools.core are vulnerable to Arbitrary Code Execution via the ReceiveVarData<T> function in the SocketClient.cs component. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter.
Github GHSA Github GHSA GHSA-vh38-ghx6-vmvg Code Injection in Masuit.Tools.Core
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-16T16:38:59.687Z

Reserved: 2022-02-24T00:00:00

Link: CVE-2022-21167

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-01T16:15:08.080

Modified: 2024-11-21T06:44:01.520

Link: CVE-2022-21167

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses