The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file. This function allows for command injection by using backticks. An attacker could craft an untrusted path input that would result in a path expansion. We recommend upgrading to 2.6.0 or past commit 52ff00a38447f06a17eab1caa2cf0730a119c751
References
Link | Resource |
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49053 | Exploit Issue Tracking Mailing List Third Party Advisory |
https://github.com/syoyo/tinygltf/blob/master/README.md | Product Third Party Advisory |
https://github.com/syoyo/tinygltf/commit/52ff00a38447f06a17eab1caa2cf0730a119c751 | Patch Third Party Advisory |
https://github.com/syoyo/tinygltf/issues/368 | Exploit Issue Tracking Patch Third Party Advisory |
https://www.debian.org/security/2022/dsa-5232 | Third Party Advisory |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49053 | Exploit Issue Tracking Mailing List Third Party Advisory |
https://github.com/syoyo/tinygltf/blob/master/README.md | Product Third Party Advisory |
https://github.com/syoyo/tinygltf/commit/52ff00a38447f06a17eab1caa2cf0730a119c751 | Patch Third Party Advisory |
https://github.com/syoyo/tinygltf/issues/368 | Exploit Issue Tracking Patch Third Party Advisory |
https://www.debian.org/security/2022/dsa-5232 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
References | () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49053 - Exploit, Issue Tracking, Mailing List, Third Party Advisory | |
References | () https://github.com/syoyo/tinygltf/blob/master/README.md - Product, Third Party Advisory | |
References | () https://github.com/syoyo/tinygltf/commit/52ff00a38447f06a17eab1caa2cf0730a119c751 - Patch, Third Party Advisory | |
References | () https://github.com/syoyo/tinygltf/issues/368 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://www.debian.org/security/2022/dsa-5232 - Third Party Advisory |
Information
Published : 2022-09-05 09:15
Updated : 2024-11-21 07:18
NVD link : CVE-2022-3008
Mitre link : CVE-2022-3008
CVE.ORG link : CVE-2022-3008
JSON object : View
Products Affected
tinygltf_project
- tinygltf
debian
- debian_linux