Arbitrary Code Execution Affecting openssl package, versions >=1.0.2, <1.0.2zf >=1.1.1, <1.1.1p >=3.0.0, <3.0.4


0.0
medium

Snyk CVSS

    Attack Complexity Low
    Privileges Required High
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    EPSS 8.51% (95th percentile)
Expand this section
NVD
9.8 critical
Expand this section
SUSE
6.7 medium
Expand this section
Red Hat
6.7 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-COCOAPODS-OPENSSL-2933697
  • published 22 Jun 2022
  • disclosed 21 Jun 2022
  • credit Chancen of Qingteng 73lab

How to fix?

Upgrade OpenSSL to version 1.0.2zf, 1.1.1p, 3.0.4 or higher.

Overview

OpenSSL is a SSL/TLS and Crypto toolkit. Deprecated in Mac OS and gone in iOS, this spec gives your project non-deprecated OpenSSL support.

Affected versions of this package are vulnerable to Arbitrary Code Execution via the c_rehash script, there are places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell.