The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above
References
Link | Resource |
---|---|
https://github.com/google/fscrypt/pull/346 | Patch Third Party Advisory |
https://github.com/google/fscrypt/pull/346 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:52
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 5.0 |
References | () https://github.com/google/fscrypt/pull/346 - Patch, Third Party Advisory |
Information
Published : 2022-02-25 11:15
Updated : 2024-11-21 06:52
NVD link : CVE-2022-25328
Mitre link : CVE-2022-25328
CVE.ORG link : CVE-2022-25328
JSON object : View
Products Affected
- fscrypt
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')