CVE-2022-3421
CVSS V2 None
CVSS V3 High 7.3
Description
An attacker can pre-create the `/Applications/Google\ Drive.app/Contents/MacOS` directory which is expected to be owned by root to be owned by a non-root user. When the Drive for Desktop installer is run for the first time, it will place a binary in that directory with execute permissions and set its setuid bit. Since the attacker owns the directory, the attacker can replace the binary with a symlink, causing the installer to set the setuid bit on the symlink. When the symlink is executed, it will run with root permissions. We recommend upgrading past version 64.0
Overview
- CVE ID
- CVE-2022-3421
- Assigner
- cve-coordination@google.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-10-17T20:15:09
- Last Modified Date
- 2022-10-19T18:10:01
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:a:google:drive:*:*:*:*:*:*:*:* | 1 | OR | 64.0 | |
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* | 0 | OR |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
- Attack Vector
- LOCAL
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- REQUIRED
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 7.3
- Base Severity
- HIGH
- Exploitability Score
- 1.3
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://support.google.com/a/answer/7577057?hl=en |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-3421 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3421 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-10-17 21:00:10 | Added to TrackCVE | |||
2022-12-07 08:28:32 | security@google.com | cve-coordination@google.com | CVE Assigner | updated |
2022-12-07 08:28:32 | 2022-10-17T20:15Z | 2022-10-17T20:15:09 | CVE Published Date | updated |
2022-12-07 08:28:32 | 2022-10-19T18:10:01 | CVE Modified Date | updated | |
2022-12-07 08:28:32 | Analyzed | Vulnerability Status | updated |