Cryptomator through 1.6.5 allows DYLIB injection because, although it has the flag 0x1000 for Hardened Runtime, it has the com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables entitlements. An attacker can exploit this by creating a malicious .dylib file that can be executed via the DYLD_INSERT_LIBRARIES environment variable.
References
Link | Resource |
---|---|
https://cryptomator.org/ | Product Vendor Advisory |
https://medium.com/%40tehwinsam/cryptomator-1-6-5-dylib-injection-8004a1e90b26 |
Configurations
History
07 Nov 2023, 03:44
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-426 |
Information
Published : 2022-02-19 03:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-25366
Mitre link : CVE-2022-25366
CVE.ORG link : CVE-2022-25366
JSON object : View
Products Affected
cryptomator
- cryptomator
CWE
CWE-426
Untrusted Search Path