Skip to content

Command injection in github.com/google/fscrypt

Moderate severity GitHub Reviewed Published Feb 26, 2022 to the GitHub Advisory Database • Updated Feb 3, 2023

Package

gomod github.com/google/fscrypt (Go)

Affected versions

< 0.3.3

Patched versions

0.3.3

Description

The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above

References

Published by the National Vulnerability Database Feb 25, 2022
Published to the GitHub Advisory Database Feb 26, 2022
Reviewed Mar 1, 2022
Last updated Feb 3, 2023

Severity

Moderate
5.0
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
Low
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2022-25328

GHSA ID

GHSA-wxjg-p59j-6c92

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.