CVE-2022-4510
Published on: Not Yet Published
Last Modified on: 02/03/2023 07:15:00 PM UTC
Certain versions of Binwalk from Refirm Labs contain the following vulnerability:
A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.3.3 included. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction, would extract a malicious binwalk module into the folder .config/binwalk/plugins. This vulnerability is associated with program files src/binwalk/plugins/unpfs.py. This issue affects binwalk from 2.1.2b through 2.3.3 included.
- CVE-2022-4510 has been assigned by
[email protected] to track the vulnerability
- The finder provided a proof-of-concept publicly so that maintainers could reproduce the vulnerability (see https://github.com/ReFirmLabs/binwalk/pull/617 https://github.com/ReFirmLabs/binwalk/pull/617 ).
- Affected Vendor/Software:
Refirm Labs - binwalk version = 2.1.2b
- The following workaround would fix the vulnerability: * removing the unpfs extractor from your local install of binwalk * disabling the unpfs extractor by editing binwalk's extract.conf configuration file * apply the fix provided at https://github.com/ReFirmLabs/binwalk/pull/617 https://github.com/ReFirmLabs/binwalk/pull/617
CVE References
Description | Tags ⓘ | Link |
---|---|---|
fix path traversal in PFS extractor script by QKaiser · Pull Request #617 · ReFirmLabs/binwalk · GitHub | github.com text/html |
![]() |
Known Affected Software
Vendor | Product | Version |
---|---|---|
Refirm Labs | binwalk | = 2.1.2b |
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-4510 : A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.… twitter.com/i/web/status/1… | 2023-01-26 21:17:56 |