CVE-2022-25366

Cryptomator through 1.6.5 allows DYLIB injection because, although it has the flag 0x1000 for Hardened Runtime, it has the com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables entitlements. An attacker can exploit this by creating a malicious .dylib file that can be executed via the DYLD_INSERT_LIBRARIES environment variable.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cryptomator:cryptomator:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:44

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@tehwinsam/cryptomator-1-6-5-dylib-injection-8004a1e90b26', 'name': 'https://medium.com/@tehwinsam/cryptomator-1-6-5-dylib-injection-8004a1e90b26', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40tehwinsam/cryptomator-1-6-5-dylib-injection-8004a1e90b26 -

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-74 CWE-426

Information

Published : 2022-02-19 03:15

Updated : 2024-02-28 19:09


NVD link : CVE-2022-25366

Mitre link : CVE-2022-25366

CVE.ORG link : CVE-2022-25366


JSON object : View

Products Affected

cryptomator

  • cryptomator
CWE
CWE-426

Untrusted Search Path