Skip to main content

Uncontrolled Search Path Element

CVE-2019-5443

Severity High
Score 7.8/10

Summary

A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl prior to 7.62.0 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.

  • LOW
  • LOCAL
  • HIGH
  • UNCHANGED
  • REQUIRED
  • NONE
  • HIGH
  • HIGH

CWE-427 - Uncontrolled Search Path Element

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.

References

Advisory Timeline

  • Published