cve/2022/CVE-2022-4883.md

19 lines
820 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-4883](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883)
![](https://img.shields.io/static/v1?label=Product&message=libXpm&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-426&color=brighgreen)
### Description
A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/1g-v/DevSec_Docker_lab
- https://github.com/L-ivan7/-.-DevSec_Docker