CVE-2022-25366

Cryptomator through 1.6.5 allows DYLIB injection because, although it has the flag 0x1000 for Hardened Runtime, it has the com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables entitlements. An attacker can exploit this by creating a malicious .dylib file that can be executed via the DYLD_INSERT_LIBRARIES environment variable.
References
Link Resource
https://medium.com/@tehwinsam/cryptomator-1-6-5-dylib-injection-8004a1e90b26 Exploit Third Party Advisory
https://cryptomator.org/ Product Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:cryptomator:cryptomator:*:*:*:*:*:*:*:*

Information

Published : 2022-02-18 19:15

Updated : 2022-03-07 08:45


NVD link : CVE-2022-25366

Mitre link : CVE-2022-25366


JSON object : View

CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Advertisement

dedicated server usa

Products Affected

cryptomator

  • cryptomator