logo

CVE-2022-25328 github.com/google/fscrypt

Package

Manager: go
Name: github.com/google/fscrypt
Vulnerable Version: >=0 <0.3.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00043 pctl0.12156

Details

Command injection in github.com/google/fscrypt The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above

Metadata

Created: 2022-02-26T00:00:44Z
Modified: 2022-03-08T18:26:50Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-wxjg-p59j-6c92/GHSA-wxjg-p59j-6c92.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-wxjg-p59j-6c92
Finding: F404
Auto approve: 1