The Keybase Clients for macOS and Windows before version 5.9.0 fails to properly remove exploded messages initiated by a user. This can occur if the receiving user switches to a non-chat feature and places the host in a sleep state before the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from a user’s filesystem.
References
Link | Resource |
---|---|
https://explore.zoom.us/en/trust/security/security-bulletin | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-02-09 15:15
Updated : 2022-02-15 18:46
NVD link : CVE-2022-22779
Mitre link : CVE-2022-22779
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
microsoft
- windows
keybase
- keybase
apple
- macos