CVE-2022-21167

All versions of package masuit.tools.core are vulnerable to Arbitrary Code Execution via the ReceiveVarData<T> function in the SocketClient.cs component. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ldqk:masuit.tools:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:44

Type Values Removed Values Added
References () https://github.com/ldqk/Masuit.Tools/blob/327f42b9f20f25bb66188672199c8265fc968d91/Masuit.Tools.Abstractions/Net/SocketClient.cs%23L197 - Broken Link () https://github.com/ldqk/Masuit.Tools/blob/327f42b9f20f25bb66188672199c8265fc968d91/Masuit.Tools.Abstractions/Net/SocketClient.cs%23L197 - Broken Link
References () https://snyk.io/vuln/SNYK-DOTNET-MASUITTOOLSCORE-2316875 - Third Party Advisory () https://snyk.io/vuln/SNYK-DOTNET-MASUITTOOLSCORE-2316875 - Third Party Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.5

Information

Published : 2022-05-01 16:15

Updated : 2024-11-21 06:44


NVD link : CVE-2022-21167

Mitre link : CVE-2022-21167

CVE.ORG link : CVE-2022-21167


JSON object : View

Products Affected

ldqk

  • masuit.tools