First published: Thu Nov 11 2021(Updated: )
The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Keybase Keybase | <5.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34422 is a path traversal vulnerability in the Keybase Client for Windows before version 5.7.0.
CVE-2021-34422 allows a malicious user to upload a file with a specially crafted name to a shared folder, potentially enabling the execution of an application.
CVE-2021-34422 has a severity rating of critical with a value of 9.
To fix the CVE-2021-34422 vulnerability, upgrade your Keybase Client for Windows to version 5.7.0 or later.
Yes, you can find more information about CVE-2021-34422 in the following reference: https://explore.zoom.us/en/trust/security/security-bulletin