Cryptomator through 1.6.5 allows DYLIB injection because, although it has the flag 0x1000 for Hardened Runtime, it has the com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables entitlements. An attacker can exploit this by creating a malicious .dylib file that can be executed via the DYLD_INSERT_LIBRARIES environment variable.
References
Link | Resource |
---|---|
https://cryptomator.org/ | Product Vendor Advisory |
https://medium.com/%40tehwinsam/cryptomator-1-6-5-dylib-injection-8004a1e90b26 | |
https://cryptomator.org/ | Product Vendor Advisory |
https://medium.com/%40tehwinsam/cryptomator-1-6-5-dylib-injection-8004a1e90b26 |
Configurations
History
No history.
Information
Published : 2022-02-19 03:15
Updated : 2024-11-21 06:52
NVD link : CVE-2022-25366
Mitre link : CVE-2022-25366
CVE.ORG link : CVE-2022-25366
JSON object : View
Products Affected
cryptomator
- cryptomator
CWE
CWE-426
Untrusted Search Path