Vulnerabilites related to keybase - keybase
CVE-2019-7249 (GCVE-0-2019-7249)
Vulnerability from cvelistv5
Published
2019-01-31 08:00
Modified
2024-08-04 20:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Keybase before 2.12.6 on macOS, the move RPC to the Helper was susceptible to time-to-check-time-to-use bugs and would also allow one user of the system (who didn't have root access) to tamper with another's installs.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:46:45.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://keybase.io/docs/secadv/kb004" }, { "name": "106824", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106824" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/471739" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "In Keybase before 2.12.6 on macOS, the move RPC to the Helper was susceptible to time-to-check-time-to-use bugs and would also allow one user of the system (who didn\u0027t have root access) to tamper with another\u0027s installs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-05T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://keybase.io/docs/secadv/kb004" }, { "name": "106824", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106824" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/471739" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7249", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Keybase before 2.12.6 on macOS, the move RPC to the Helper was susceptible to time-to-check-time-to-use bugs and would also allow one user of the system (who didn\u0027t have root access) to tamper with another\u0027s installs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://keybase.io/docs/secadv/kb004", "refsource": "MISC", "url": "https://keybase.io/docs/secadv/kb004" }, { "name": "106824", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106824" }, { "name": "https://hackerone.com/reports/471739", "refsource": "MISC", "url": "https://hackerone.com/reports/471739" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-7249", "datePublished": "2019-01-31T08:00:00", "dateReserved": "2019-01-31T00:00:00", "dateUpdated": "2024-08-04T20:46:45.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-18629 (GCVE-0-2018-18629)
Vulnerability from cvelistv5
Published
2018-12-20 22:00
Modified
2024-08-05 11:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in the Keybase command-line client before 2.8.0-20181023124437 for Linux. An untrusted search path vulnerability in the keybase-redirector application allows a local, unprivileged user on Linux to gain root privileges via a Trojan horse binary.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:15:59.944Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://keybase.io/docs/secadv/kb002" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.mirch.io/2018/12/21/cve-2018-18629-keybase-linux-privilege-escalation/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/426944" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-12-18T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Keybase command-line client before 2.8.0-20181023124437 for Linux. An untrusted search path vulnerability in the keybase-redirector application allows a local, unprivileged user on Linux to gain root privileges via a Trojan horse binary." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-21T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://keybase.io/docs/secadv/kb002" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.mirch.io/2018/12/21/cve-2018-18629-keybase-linux-privilege-escalation/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/426944" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-18629", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Keybase command-line client before 2.8.0-20181023124437 for Linux. An untrusted search path vulnerability in the keybase-redirector application allows a local, unprivileged user on Linux to gain root privileges via a Trojan horse binary." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://keybase.io/docs/secadv/kb002", "refsource": "CONFIRM", "url": "https://keybase.io/docs/secadv/kb002" }, { "name": "https://blog.mirch.io/2018/12/21/cve-2018-18629-keybase-linux-privilege-escalation/", "refsource": "MISC", "url": "https://blog.mirch.io/2018/12/21/cve-2018-18629-keybase-linux-privilege-escalation/" }, { "name": "https://hackerone.com/reports/426944", "refsource": "MISC", "url": "https://hackerone.com/reports/426944" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-18629", "datePublished": "2018-12-20T22:00:00", "dateReserved": "2018-10-23T00:00:00", "dateUpdated": "2024-08-05T11:15:59.944Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-22779 (GCVE-0-2022-22779)
Vulnerability from cvelistv5
Published
2022-02-09 22:05
Modified
2024-09-17 00:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Improper Enforcement of Behavioral Workflow
Summary
The Keybase Clients for macOS and Windows before version 5.9.0 fails to properly remove exploded messages initiated by a user. This can occur if the receiving user switches to a non-chat feature and places the host in a sleep state before the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from a user’s filesystem.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Zoom Video Communications Inc | Keybase Client for macOS |
Version: unspecified < 5.9.0 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:49.090Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Keybase Client for macOS", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Keybase Client for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Olivia O\u0027Hara" } ], "datePublic": "2022-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Keybase Clients for macOS and Windows before version 5.9.0 fails to properly remove exploded messages initiated by a user. This can occur if the receiving user switches to a non-chat feature and places the host in a sleep state before the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from a user\u2019s filesystem." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Enforcement of Behavioral Workflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:05:15", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "source": { "discovery": "USER" }, "title": "Retained exploded messages in Keybase clients for macOS and Windows", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@zoom.us", "DATE_PUBLIC": "2022-02-08T12:00:00.000Z", "ID": "CVE-2022-22779", "STATE": "PUBLIC", "TITLE": "Retained exploded messages in Keybase clients for macOS and Windows" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Keybase Client for macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.9.0" } ] } }, { "product_name": "Keybase Client for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.9.0" } ] } } ] }, "vendor_name": "Zoom Video Communications Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Olivia O\u0027Hara" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Keybase Clients for macOS and Windows before version 5.9.0 fails to properly remove exploded messages initiated by a user. This can occur if the receiving user switches to a non-chat feature and places the host in a sleep state before the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from a user\u2019s filesystem." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Enforcement of Behavioral Workflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://explore.zoom.us/en/trust/security/security-bulletin", "refsource": "MISC", "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ] }, "source": { "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2022-22779", "datePublished": "2022-02-09T22:05:15.143232Z", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-09-17T00:05:46.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-16992 (GCVE-0-2019-16992)
Vulnerability from cvelistv5
Published
2019-09-29 23:52
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Keybase app 2.13.2 for iOS provides potentially insufficient notice that it is employing a user's private key to sign a certain cryptocurrency attestation (that an address at keybase.io can be used for Stellar payments to the user), which might be incompatible with a user's personal position on the semantics of an attestation.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.745Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sneak.berlin/20190929/keybase-backdoor/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/keybase/keybase-issues/issues/3583" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Keybase app 2.13.2 for iOS provides potentially insufficient notice that it is employing a user\u0027s private key to sign a certain cryptocurrency attestation (that an address at keybase.io can be used for Stellar payments to the user), which might be incompatible with a user\u0027s personal position on the semantics of an attestation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-29T23:52:58", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://sneak.berlin/20190929/keybase-backdoor/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/keybase/keybase-issues/issues/3583" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-16992", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Keybase app 2.13.2 for iOS provides potentially insufficient notice that it is employing a user\u0027s private key to sign a certain cryptocurrency attestation (that an address at keybase.io can be used for Stellar payments to the user), which might be incompatible with a user\u0027s personal position on the semantics of an attestation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://sneak.berlin/20190929/keybase-backdoor/", "refsource": "MISC", "url": "https://sneak.berlin/20190929/keybase-backdoor/" }, { "name": "https://github.com/keybase/keybase-issues/issues/3583", "refsource": "MISC", "url": "https://github.com/keybase/keybase-issues/issues/3583" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-16992", "datePublished": "2019-09-29T23:52:58", "dateReserved": "2019-09-29T00:00:00", "dateUpdated": "2024-08-05T01:24:48.745Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-34422 (GCVE-0-2021-34422)
Vulnerability from cvelistv5
Published
2021-11-11 22:58
Modified
2024-09-17 03:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Relative Path Traversal
Summary
The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications Inc | Keybase Client for Windows |
Version: unspecified < 5.7.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:12:50.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Keybase Client for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.7.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "m4t35z" } ], "datePublic": "2021-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Relative Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-11T22:58:22", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "source": { "discovery": "USER" }, "title": "Path traversal of file names in Keybase Client for Windows", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "Zoom Communications Inc", "ASSIGNER": "security@zoom.us", "DATE_PUBLIC": "2021-11-12T17:00:00.000Z", "ID": "CVE-2021-34422", "STATE": "PUBLIC", "TITLE": "Path traversal of file names in Keybase Client for Windows" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Keybase Client for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.0" } ] } } ] }, "vendor_name": "Zoom Video Communications Inc" } ] } }, "credit": [ { "lang": "eng", "value": "m4t35z" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Relative Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://explore.zoom.us/en/trust/security/security-bulletin", "refsource": "MISC", "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ] }, "source": { "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2021-34422", "datePublished": "2021-11-11T22:58:22.996455Z", "dateReserved": "2021-06-09T00:00:00", "dateUpdated": "2024-09-17T03:12:21.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-34421 (GCVE-0-2021-34421)
Vulnerability from cvelistv5
Published
2021-11-11 22:58
Modified
2024-09-17 01:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cleartext Storage of Sensitive Information
Summary
The Keybase Client for Android before version 5.8.0 and the Keybase Client for iOS before version 5.8.0 fails to properly remove exploded messages initiated by a user if the receiving user places the chat session in the background while the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from the customer's device.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Zoom Video Communications Inc | Keybase Client for Android |
Version: unspecified < 5.8.0 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:12:50.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Keybase Client for Android", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Keybase Client for iOS", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.8.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Olivia O\u0027Hara, John Jackson, Jackson Henry, and Robert Willis" } ], "datePublic": "2021-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The Keybase Client for Android before version 5.8.0 and the Keybase Client for iOS before version 5.8.0 fails to properly remove exploded messages initiated by a user if the receiving user places the chat session in the background while the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from the customer\u0027s device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Cleartext Storage of Sensitive Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-11T23:06:56", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "source": { "discovery": "USER" }, "title": "Retained exploded messages in Keybase Clients for Android and iOS", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "Zoom Communications Inc", "ASSIGNER": "security@zoom.us", "DATE_PUBLIC": "2021-11-12T17:00:00.000Z", "ID": "CVE-2021-34421", "STATE": "PUBLIC", "TITLE": "Retained exploded messages in Keybase Clients for Android and iOS" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Keybase Client for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.0" } ] } }, { "product_name": "Keybase Client for iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.0" } ] } } ] }, "vendor_name": "Zoom Video Communications Inc" } ] } }, "credit": [ { "lang": "eng", "value": "Olivia O\u0027Hara, John Jackson, Jackson Henry, and Robert Willis" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Keybase Client for Android before version 5.8.0 and the Keybase Client for iOS before version 5.8.0 fails to properly remove exploded messages initiated by a user if the receiving user places the chat session in the background while the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from the customer\u0027s device." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cleartext Storage of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://explore.zoom.us/en/trust/security/security-bulletin", "refsource": "MISC", "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ] }, "source": { "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2021-34421", "datePublished": "2021-11-11T22:58:37.355085Z", "dateReserved": "2021-06-09T00:00:00", "dateUpdated": "2024-09-17T01:41:23.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-34426 (GCVE-0-2021-34426)
Vulnerability from cvelistv5
Published
2021-12-14 19:26
Modified
2024-09-17 04:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Untrusted Search Path
Summary
A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the "keybase git lfs-config" command on the command-line. In versions prior to 5.6.0, a malicious actor with write access to a user\'s Git repository could leverage this vulnerability to potentially execute arbitrary Windows commands on a user\'s local system.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zoom Video Communications Inc | Keybase Client for Windows |
Version: unspecified < 5.6.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:12:50.181Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Keybase Client for Windows", "vendor": "Zoom Video Communications Inc", "versions": [ { "lessThan": "5.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "RyotaK (https://blog.ryotak.me/)" } ], "datePublic": "2021-12-14T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the \"keybase git lfs-config\" command on the command-line. In versions prior to 5.6.0, a malicious actor with write access to a user\\\u0027s Git repository could leverage this vulnerability to potentially execute arbitrary Windows commands on a user\\\u0027s local system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Untrusted Search Path", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:10", "orgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "shortName": "Zoom" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "source": { "discovery": "USER" }, "title": "Arbitrary command execution in Keybase Client for Windows", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "Zoom Communications Inc", "ASSIGNER": "security@zoom.us", "DATE_PUBLIC": "2021-12-14T15:00:00.000Z", "ID": "CVE-2021-34426", "STATE": "PUBLIC", "TITLE": "Arbitrary command execution in Keybase Client for Windows" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Keybase Client for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.0" } ] } } ] }, "vendor_name": "Zoom Video Communications Inc" } ] } }, "credit": [ { "lang": "eng", "value": "RyotaK (https://blog.ryotak.me/)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the \"keybase git lfs-config\" command on the command-line. In versions prior to 5.6.0, a malicious actor with write access to a user\\\u0027s Git repository could leverage this vulnerability to potentially execute arbitrary Windows commands on a user\\\u0027s local system." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Untrusted Search Path" } ] } ] }, "references": { "reference_data": [ { "name": "https://explore.zoom.us/en/trust/security/security-bulletin", "refsource": "MISC", "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ] }, "source": { "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "99b9af0d-a833-4a5d-9e2f-8b1324f35351", "assignerShortName": "Zoom", "cveId": "CVE-2021-34426", "datePublished": "2021-12-14T19:26:03.894799Z", "dateReserved": "2021-06-09T00:00:00", "dateUpdated": "2024-09-17T04:09:55.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-23827 (GCVE-0-2021-23827)
Vulnerability from cvelistv5
Published
2021-02-22 23:07
Modified
2024-08-03 19:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Keybase Desktop Client before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, allows an attacker to obtain potentially sensitive media (such as private pictures) in the Cache and uploadtemps directories. It fails to effectively clear cached pictures, even after deletion via normal methodology within the client, or by utilizing the "Explode message/Explode now" functionality. Local filesystem access is needed by the attacker.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:14:08.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/keybase/client/releases" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://johnjhacking.com/blog/cve-2021-23827/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1074930" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Keybase Desktop Client before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, allows an attacker to obtain potentially sensitive media (such as private pictures) in the Cache and uploadtemps directories. It fails to effectively clear cached pictures, even after deletion via normal methodology within the client, or by utilizing the \"Explode message/Explode now\" functionality. Local filesystem access is needed by the attacker." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-22T23:07:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/keybase/client/releases" }, { "tags": [ "x_refsource_MISC" ], "url": "https://johnjhacking.com/blog/cve-2021-23827/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1074930" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-23827", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Keybase Desktop Client before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, allows an attacker to obtain potentially sensitive media (such as private pictures) in the Cache and uploadtemps directories. It fails to effectively clear cached pictures, even after deletion via normal methodology within the client, or by utilizing the \"Explode message/Explode now\" functionality. Local filesystem access is needed by the attacker." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/keybase/client/releases", "refsource": "MISC", "url": "https://github.com/keybase/client/releases" }, { "name": "https://johnjhacking.com/blog/cve-2021-23827/", "refsource": "MISC", "url": "https://johnjhacking.com/blog/cve-2021-23827/" }, { "name": "https://hackerone.com/reports/1074930", "refsource": "MISC", "url": "https://hackerone.com/reports/1074930" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-23827", "datePublished": "2021-02-22T23:07:21", "dateReserved": "2021-01-11T00:00:00", "dateUpdated": "2024-08-03T19:14:08.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2018-12-20 23:29
Modified
2024-11-21 03:56
Severity ?
Summary
An issue was discovered in the Keybase command-line client before 2.8.0-20181023124437 for Linux. An untrusted search path vulnerability in the keybase-redirector application allows a local, unprivileged user on Linux to gain root privileges via a Trojan horse binary.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.mirch.io/2018/12/21/cve-2018-18629-keybase-linux-privilege-escalation/ | Exploit, Third Party Advisory | |
cve@mitre.org | https://hackerone.com/reports/426944 | Exploit, Patch, Third Party Advisory | |
cve@mitre.org | https://keybase.io/docs/secadv/kb002 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.mirch.io/2018/12/21/cve-2018-18629-keybase-linux-privilege-escalation/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/426944 | Exploit, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://keybase.io/docs/secadv/kb002 | Exploit, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keybase:keybase:*:*:*:*:*:linux:*:*", "matchCriteriaId": "B1773EE1-A3E9-43B3-B6A9-E75F3DC4A6F8", "versionEndExcluding": "2.8.0-20181023124437", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Keybase command-line client before 2.8.0-20181023124437 for Linux. An untrusted search path vulnerability in the keybase-redirector application allows a local, unprivileged user on Linux to gain root privileges via a Trojan horse binary." }, { "lang": "es", "value": "Se ha descubierto un problema en el cliente de l\u00ednea de comandos Keybase, en versiones anteriores a la 2.8.-20181023124437, para Linux. Una vulnerabilidad de ruta de b\u00fasqueda no fiable en la aplicaci\u00f3n keybase-redirector permite que un usuario local sin privilegios en Linux obtenga privilegios root mediante un binario troyano." } ], "id": "CVE-2018-18629", "lastModified": "2024-11-21T03:56:15.883", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-20T23:29:00.800", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.mirch.io/2018/12/21/cve-2018-18629-keybase-linux-privilege-escalation/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/426944" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://keybase.io/docs/secadv/kb002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.mirch.io/2018/12/21/cve-2018-18629-keybase-linux-privilege-escalation/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/426944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://keybase.io/docs/secadv/kb002" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:47
Severity ?
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
The Keybase Clients for macOS and Windows before version 5.9.0 fails to properly remove exploded messages initiated by a user. This can occur if the receiving user switches to a non-chat feature and places the host in a sleep state before the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from a user’s filesystem.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keybase:keybase:*:*:*:*:*:*:*:*", "matchCriteriaId": "5491EE0E-1504-416F-A820-2F6361D36356", "versionEndExcluding": "5.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Keybase Clients for macOS and Windows before version 5.9.0 fails to properly remove exploded messages initiated by a user. This can occur if the receiving user switches to a non-chat feature and places the host in a sleep state before the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from a user\u2019s filesystem." }, { "lang": "es", "value": "Los clientes de Keybase para macOS y Windows anteriores a la versi\u00f3n 5.9.0 no eliminan correctamente los mensajes explotados iniciados por un usuario. Esto puede ocurrir si el usuario receptor cambia a una funci\u00f3n que no sea de chat y coloca el host en un estado de suspensi\u00f3n antes de que el usuario emisor explote los mensajes. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n confidencial que deb\u00eda ser eliminada del sistema de archivos de un usuario" } ], "id": "CVE-2022-22779", "lastModified": "2024-11-21T06:47:25.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-09T23:15:19.107", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-212" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-23 00:15
Modified
2024-11-21 05:51
Severity ?
Summary
Keybase Desktop Client before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, allows an attacker to obtain potentially sensitive media (such as private pictures) in the Cache and uploadtemps directories. It fails to effectively clear cached pictures, even after deletion via normal methodology within the client, or by utilizing the "Explode message/Explode now" functionality. Local filesystem access is needed by the attacker.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/keybase/client/releases | Release Notes, Third Party Advisory | |
cve@mitre.org | https://hackerone.com/reports/1074930 | Exploit, Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://johnjhacking.com/blog/cve-2021-23827/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/keybase/client/releases | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1074930 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://johnjhacking.com/blog/cve-2021-23827/ | Exploit, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keybase:keybase:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB47E767-AB7D-40EA-BC26-2BCA3FD29271", "versionEndExcluding": "5.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:keybase:keybase:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF8618D1-A963-4F75-94BA-74994AAFB2FF", "versionEndExcluding": "5.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EBE07A-6FEF-4343-BA5D-58FD175F5CD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Keybase Desktop Client before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, allows an attacker to obtain potentially sensitive media (such as private pictures) in the Cache and uploadtemps directories. It fails to effectively clear cached pictures, even after deletion via normal methodology within the client, or by utilizing the \"Explode message/Explode now\" functionality. Local filesystem access is needed by the attacker." }, { "lang": "es", "value": "Keybase Desktop Client antes de la versi\u00f3n 5.6.0 en Windows y macOS, y antes de la 5.6.1 en Linux, permite a un atacante obtener medios potencialmente sensibles (como fotos privadas) en los directorios Cache y uploadtemps. No consigue borrar eficazmente las im\u00e1genes almacenadas en la cach\u00e9, ni siquiera despu\u00e9s de haberlas borrado mediante la metodolog\u00eda normal dentro del cliente, o utilizando la funcionalidad \"Explotar mensaje/Explotar ahora\". El atacante necesita acceso al sistema de archivos local." } ], "id": "CVE-2021-23827", "lastModified": "2024-11-21T05:51:54.273", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-23T00:15:12.533", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/keybase/client/releases" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1074930" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://johnjhacking.com/blog/cve-2021-23827/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/keybase/client/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1074930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://johnjhacking.com/blog/cve-2021-23827/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-14 20:15
Modified
2024-11-21 06:10
Severity ?
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the "keybase git lfs-config" command on the command-line. In versions prior to 5.6.0, a malicious actor with write access to a user\'s Git repository could leverage this vulnerability to potentially execute arbitrary Windows commands on a user\'s local system.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://explore.zoom.us/en/trust/security/security-bulletin | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://explore.zoom.us/en/trust/security/security-bulletin | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keybase:keybase:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB47E767-AB7D-40EA-BC26-2BCA3FD29271", "versionEndExcluding": "5.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the \"keybase git lfs-config\" command on the command-line. In versions prior to 5.6.0, a malicious actor with write access to a user\\\u0027s Git repository could leverage this vulnerability to potentially execute arbitrary Windows commands on a user\\\u0027s local system." }, { "lang": "es", "value": "Se ha detecado una vulnerabilidad en el cliente Keybase para Windows antes de la versi\u00f3n 5.6.0 cuando un usuario ejecutaba el comando \"keybase git lfs-config\" en la l\u00ednea de comandos. En las versiones anteriores a la 5.6.0, un actor malicioso con acceso de escritura al repositorio Git de un usuario pod\u00eda aprovechar esta vulnerabilidad para ejecutar potencialmente comandos arbitrarios de Windows en el sistema local de un usuario" } ], "id": "CVE-2021-34426", "lastModified": "2024-11-21T06:10:22.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-14T20:15:07.437", "references": [ { "source": "security@zoom.us", "tags": [ "Third Party Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-31 09:29
Modified
2024-11-21 04:47
Severity ?
Summary
In Keybase before 2.12.6 on macOS, the move RPC to the Helper was susceptible to time-to-check-time-to-use bugs and would also allow one user of the system (who didn't have root access) to tamper with another's installs.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/106824 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://hackerone.com/reports/471739 | Exploit, Patch, Third Party Advisory | |
cve@mitre.org | https://keybase.io/docs/secadv/kb004 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106824 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/471739 | Exploit, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://keybase.io/docs/secadv/kb004 | Exploit, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keybase:keybase:*:*:*:*:*:macos:*:*", "matchCriteriaId": "7451C3EF-1480-41FE-B494-26994DFB2957", "versionEndExcluding": "2.12.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Keybase before 2.12.6 on macOS, the move RPC to the Helper was susceptible to time-to-check-time-to-use bugs and would also allow one user of the system (who didn\u0027t have root access) to tamper with another\u0027s installs." }, { "lang": "es", "value": "En Keybase, en versiones anteriores a la 2.12.6 en macOS, \"move RPC to the Helper\" era propenso a errores TOCTOU (time-to-check-time-to-use) y tambi\u00e9n permitir\u00eda que un usuario del sistema (que no tiene acceso root) manipulase la instalaci\u00f3n de otra persona." } ], "id": "CVE-2019-7249", "lastModified": "2024-11-21T04:47:50.300", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-31T09:29:00.610", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106824" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/471739" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://keybase.io/docs/secadv/kb004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106824" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://hackerone.com/reports/471739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://keybase.io/docs/secadv/kb004" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-11 23:15
Modified
2024-11-21 06:10
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
9.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
9.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Summary
The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keybase:keybase:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BDDF516F-DBB2-411D-B91A-C1F19190C941", "versionEndExcluding": "5.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution." }, { "lang": "es", "value": "Keybase Client para Windows versiones anteriores a 5.7.0, contiene una vulnerabilidad de salto de ruta cuando comprueba el nombre de un archivo subido a una carpeta de equipo. Un usuario malicioso podr\u00eda subir un archivo a una carpeta compartida con un nombre de archivo especialmente dise\u00f1ado que podr\u00eda permitir a un usuario ejecutar una aplicaci\u00f3n que no estaba prevista en su m\u00e1quina anfitriona. Si un usuario malicioso aprovechara este problema con la funci\u00f3n de compartir carpetas p\u00fablicas del cliente de Keybase, esto podr\u00eda conllevar la ejecuci\u00f3n de c\u00f3digo remota" } ], "id": "CVE-2021-34422", "lastModified": "2024-11-21T06:10:22.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.7, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-11T23:15:10.143", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-30 00:15
Modified
2024-11-21 04:31
Severity ?
Summary
The Keybase app 2.13.2 for iOS provides potentially insufficient notice that it is employing a user's private key to sign a certain cryptocurrency attestation (that an address at keybase.io can be used for Stellar payments to the user), which might be incompatible with a user's personal position on the semantics of an attestation.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/keybase/keybase-issues/issues/3583 | Third Party Advisory | |
cve@mitre.org | https://sneak.berlin/20190929/keybase-backdoor/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/keybase/keybase-issues/issues/3583 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://sneak.berlin/20190929/keybase-backdoor/ | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keybase:keybase:2.13.2:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "41A29D45-1614-4CB3-9A26-0ADEAB87EC46", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Keybase app 2.13.2 for iOS provides potentially insufficient notice that it is employing a user\u0027s private key to sign a certain cryptocurrency attestation (that an address at keybase.io can be used for Stellar payments to the user), which might be incompatible with a user\u0027s personal position on the semantics of an attestation." }, { "lang": "es", "value": "La aplicaci\u00f3n Keybase versi\u00f3n 2.13.2 para iOS, provee una notificaci\u00f3n potencialmente insuficiente que est\u00e1 empleando la clave privada de un usuario para firmar una determinada certificaci\u00f3n de criptomoneda (que una direcci\u00f3n en keybase.io puede ser usada para pagos Stellar al usuario), lo que podr\u00eda ser incompatible con la posici\u00f3n personal de un usuario sobre la sem\u00e1ntica de una certificaci\u00f3n." } ], "id": "CVE-2019-16992", "lastModified": "2024-11-21T04:31:29.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-30T00:15:10.080", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/keybase/keybase-issues/issues/3583" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://sneak.berlin/20190929/keybase-backdoor/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/keybase/keybase-issues/issues/3583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://sneak.berlin/20190929/keybase-backdoor/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-11 23:15
Modified
2024-11-21 06:10
Severity ?
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Summary
The Keybase Client for Android before version 5.8.0 and the Keybase Client for iOS before version 5.8.0 fails to properly remove exploded messages initiated by a user if the receiving user places the chat session in the background while the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from the customer's device.
References
▶ | URL | Tags | |
---|---|---|---|
security@zoom.us | https://explore.zoom.us/en/trust/security/security-bulletin | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://explore.zoom.us/en/trust/security/security-bulletin | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keybase:keybase:5.8.0:*:*:*:*:android:*:*", "matchCriteriaId": "B10E64A0-3C0E-4ED3-9978-2DE883191A06", "vulnerable": true }, { "criteria": "cpe:2.3:a:keybase:keybase:5.8.0:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "FC887BBA-4A93-49C7-83F0-F7A5BCD65BA1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Keybase Client for Android before version 5.8.0 and the Keybase Client for iOS before version 5.8.0 fails to properly remove exploded messages initiated by a user if the receiving user places the chat session in the background while the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from the customer\u0027s device." }, { "lang": "es", "value": "Keybase Client para Android versiones anteriores a 5.8.0 y Keybase Client para iOS versiones anteriores a 5.8.0 no eliminan correctamente los mensajes explotados iniciados por un usuario si el usuario receptor coloca la sesi\u00f3n de chat en segundo plano mientras el usuario emisor explota los mensajes. Esto podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n confidencial que deb\u00eda ser eliminada del dispositivo del cliente" } ], "id": "CVE-2021-34421", "lastModified": "2024-11-21T06:10:22.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-11T23:15:09.997", "references": [ { "source": "security@zoom.us", "tags": [ "Third Party Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-459" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }