Cryptomator through 1.6.5 allows DYLIB injection because, although it has the flag 0x1000 for Hardened Runtime, it has the com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables entitlements. An attacker can exploit this by creating a malicious .dylib file that can be executed via the DYLD_INSERT_LIBRARIES environment variable.
References
Link | Resource |
---|---|
https://medium.com/@tehwinsam/cryptomator-1-6-5-dylib-injection-8004a1e90b26 | Exploit Third Party Advisory |
https://cryptomator.org/ | Product Vendor Advisory |
Configurations
Information
Published : 2022-02-18 19:15
Updated : 2022-03-07 08:45
NVD link : CVE-2022-25366
Mitre link : CVE-2022-25366
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
cryptomator
- cryptomator