Lucene search

K
githubGitHub Advisory DatabaseGHSA-8M3F-G62J-3VX8
HistoryDec 27, 2022 - 12:30 p.m.

binwalk vulnerable to UNIX Symbolic Link (Symlink) Following

2022-12-2712:30:19
CWE-59
CWE-61
GitHub Advisory Database
github.com
19
vulnerability
refirm labs
binwalk
symlink
following
remote attack
upgrade
version 2.3.3
patch
fa0c0bd59b8588814756942fe4cb5452e76c1dcd
component
vdb-216876

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

50.0%

A vulnerability, which was classified as problematic, was found in ReFirm Labs binwalk up to 2.3.2. Affected is an unknown function of the file src/binwalk/modules/extractor.py of the component Archive Extraction Handler. The manipulation leads to symlink following. It is possible to launch the attack remotely. Upgrading to version 2.3.3 can address this issue. The name of the patch is fa0c0bd59b8588814756942fe4cb5452e76c1dcd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216876.

Affected configurations

Vulners
Node
microsoftbinwalkRange<2.3.3
CPENameOperatorVersion
binwalklt2.3.3

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

50.0%