7.8
CVSSv3

CVE-2022-4510

Published: 26/01/2023 Updated: 06/02/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8

Vulnerability Summary

A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b up to and including 2.3.3 included. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction, would extract a malicious binwalk module into the folder .config/binwalk/plugins. This vulnerability is associated with program files src/binwalk/plugins/unpfs.py. This issue affects binwalk from 2.1.2b up to and including 2.3.3 included.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft binwalk

Github Repositories

CVE-2022-4510 A path traversal vulnerability was identified in ReFirm Labs binwalk from version 212b through 233 included By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option) Remote code execution can be achieved by building a PFS filesystem