CVE-2022-4428

Name
CVE-2022-4428
Description
support_uri parameter in the WARP client local settings file (mdm.xml) lacked proper validation which allowed for privilege escalation and launching an arbitrary executable on the local machine upon clicking on the "Send feedback" option. An attacker with access to the local file system could use a crafted XML config file pointing to a malicious file or set a local path to the executable using Cloudflare Zero Trust Dashboard (for Zero Trust enrolled clients).
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/cloudflare/advisories/security/advisories/GHSA-h3j3-fhqg-66rh

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:cloudflare:warp:*:*:*:*:*:windows:*:* warp >= None <= 2022.10.106.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
warp 3.18-community 0.5.4-r0 knuxify <knuxify@gmail.com> possibly vulnerable
warp 3.19-community 0.6.2-r0 knuxify <knuxify@gmail.com> possibly vulnerable
warp 3.20-community 0.7.0-r0 knuxify <knuxify@gmail.com> possibly vulnerable
warp edge-community 0.8.0-r0 knuxify <knuxify@gmail.com> possibly vulnerable