CVE-2022-3008

high

Description

The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file. This function allows for command injection by using backticks. An attacker could craft an untrusted path input that would result in a path expansion. We recommend upgrading to 2.6.0 or past commit 52ff00a38447f06a17eab1caa2cf0730a119c751

References

https://www.debian.org/security/2022/dsa-5232

https://github.com/syoyo/tinygltf/issues/368

https://github.com/syoyo/tinygltf/commit/52ff00a38447f06a17eab1caa2cf0730a119c751

https://github.com/syoyo/tinygltf/blob/master/README.md

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49053

Details

Source: Mitre, NVD

Published: 2022-09-05

Updated: 2022-10-01

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High