First published: Wed Nov 16 2022(Updated: )
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | <2.9.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39347 is a vulnerability in FreeRDP that allows a malicious server to trick a client into reading files outside the shared directory.
The severity of CVE-2022-39347 is medium with a CVSS score of 5.7.
Versions up to exclusive 2.9.0 of FreeRDP are affected by CVE-2022-39347.
A malicious server can exploit CVE-2022-39347 by tricking a FreeRDP client into reading files outside the shared directory.
CVE-2022-39347 has been addressed in the latest version of FreeRDP. Please update to the latest version to fix the vulnerability.