Keybase Client for Windows before 5.7.0 is vulnerable to path traversal. Attackers can upload crafted files leading to unauthorized code execution. Learn how to mitigate.
The Keybase Client for Windows before version 5.7.0 is affected by a path traversal vulnerability that could allow a malicious user to execute unauthorized applications on their host machine. This CVE has a base severity rating of HIGH.
Understanding CVE-2021-34422
This CVE relates to a path traversal vulnerability in the Keybase Client for Windows, impacting versions less than 5.7.0.
What is CVE-2021-34422?
The Keybase Client for Windows before version 5.7.0 is susceptible to a path traversal vulnerability during file name checks for uploads to a team folder. An attacker could upload a file with a specially crafted name to a shared folder, enabling the execution of unintended applications on the victim's machine. Exploiting this issue via the public folder sharing feature could lead to remote code execution.
The Impact of CVE-2021-34422
With a CVSS base score of 7.2 (HIGH severity), this vulnerability poses a significant threat. Attackers leveraging this vulnerability could execute malicious code on a target system, potentially leading to unauthorized access or data breach.
Technical Details of CVE-2021-34422
The vulnerability is categorized as a Relative Path Traversal issue. Here are additional technical details:
Vulnerability Description
The flaw allows an attacker to manipulate file names during uploads, leading to unintended code execution.
Affected Systems and Versions
Keybase Client for Windows versions prior to 5.7.0 are impacted by this vulnerability.
Exploitation Mechanism
By uploading a file with a maliciously crafted name to a shared folder, an attacker can trigger the execution of unauthorized applications on the victim's machine.
Mitigation and Prevention
To address CVE-2021-34422, consider the following security measures:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security bulletins and patches released by Zoom Video Communications Inc to protect systems from known vulnerabilities.