CVE-2022-3008 — OS Command Injection in Tinygltf
Severity
8.8HIGHNVD
EPSS
7.6%
top 8.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 5
Latest updateDec 30
Description
The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file. This function allows for command injection by using backticks. An attacker could craft an untrusted path input that would result in a path expansion. We recommend upgrading to 2.6.0 or past commit 52ff00a38447f06a17eab1caa2cf0730a119c751
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages5 packages
Also affects: Debian Linux 11.0
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-ghg5-6g69-q4q3: The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file↗2022-09-06
OSV▶
CVE-2022-3008: The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file↗2022-09-05