CVE-2022-3008OS Command Injection in Tinygltf

Severity
8.8HIGHNVD
EPSS
7.6%
top 8.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 5
Latest updateDec 30

Description

The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file. This function allows for command injection by using backticks. An attacker could craft an untrusted path input that would result in a path expansion. We recommend upgrading to 2.6.0 or past commit 52ff00a38447f06a17eab1caa2cf0730a119c751

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5syoyo/tinygltfunspecified2.6.0
debiandebian/tinygltf< tinygltf 2.5.0+dfsg-5 (bookworm)
Debiantinygltf_project/tinygltf< 2.5.0+dfsg-3+deb11u1+3
Linuxlinux/linux_kernel5.13.05.15.86+2

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

3
OSV
drm/amdgpu: Fix type of second parameter in odn_edit_dpm_table() callback2025-12-30
GHSA
GHSA-ghg5-6g69-q4q3: The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file2022-09-06
OSV
CVE-2022-3008: The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file2022-09-05

📋Vendor Advisories

2
Ubuntu
TinyGLTF vulnerability2024-11-26
Debian
CVE-2022-3008: tinygltf - The tinygltf library uses the C library function wordexp() to perform file path ...2022