Description
A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the "keybase git lfs-config" command on the command-line. In versions prior to 5.6.0, a malicious actor with write access to a user\'s Git repository could leverage this vulnerability to potentially execute arbitrary Windows commands on a user\'s local system.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21084 | A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the "keybase git lfs-config" command on the command-line. In versions prior to 5.6.0, a malicious actor with write access to a user\'s Git repository could leverage this vulnerability to potentially execute arbitrary Windows commands on a user\'s local system. |
References
| Link | Providers |
|---|---|
| https://explore.zoom.us/en/trust/security/security-bulletin |
|
History
No history.
Status: PUBLISHED
Assigner: Zoom
Published:
Updated: 2024-09-17T04:09:55.829Z
Reserved: 2021-06-09T00:00:00.000Z
Link: CVE-2021-34426
No data.
Status : Modified
Published: 2021-12-14T20:15:07.437
Modified: 2024-11-21T06:10:22.953
Link: CVE-2021-34426
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD