Published on: Not Yet Published
Last Modified on: 02/03/2023 07:15:00 PM UTC
A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.3.3 included. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction, would extract a malicious binwalk module into the folder .config/binwalk/plugins. This vulnerability is associated with program files src/binwalk/plugins/unpfs.py. This issue affects binwalk from 2.1.2b through 2.3.3 included.
- CVE-2022-4510 has been assigned by [email protected] to track the vulnerability
- The finder provided a proof-of-concept publicly so that maintainers could reproduce the vulnerability (see https://github.com/ReFirmLabs/binwalk/pull/617 https://github.com/ReFirmLabs/binwalk/pull/617 ).
- Affected Vendor/Software: Refirm Labs - binwalk version = 2.1.2b
- The following workaround would fix the vulnerability: * removing the unpfs extractor from your local install of binwalk * disabling the unpfs extractor by editing binwalk's extract.conf configuration file * apply the fix provided at https://github.com/ReFirmLabs/binwalk/pull/617 https://github.com/ReFirmLabs/binwalk/pull/617
|fix path traversal in PFS extractor script by QKaiser · Pull Request #617 · ReFirmLabs/binwalk · GitHub|| github.com |
|@CVEreport||CVE-2022-4510 : A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.… twitter.com/i/web/status/1…||2023-01-26 21:17:56|