CVE-2023-0652

Name
CVE-2023-0652
Description
Due to a hardlink created in the ProgramData folder during the repair process of the software, the installer (MSI) of WARP Client for Windows (<= 2022.12.582.0) allowed a malicious attacker to forge the destination of the hardlink and escalate privileges, overwriting SYSTEM protected files. As Cloudflare WARP client for Windows (up to version 2022.5.309.0) allowed creation of mount points from its ProgramData folder, during installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://developers.cloudflare.com/warp-client/get-started/windows/
MISC https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release
MISC https://github.com/cloudflare/advisories/security/advisories/GHSA-xmhj-9p83-xvw9

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:cloudflare:warp:*:*:*:*:*:windows:*:* warp >= None < 2023.3.381.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
warp 3.18-community 0.5.4-r0 knuxify <knuxify@gmail.com> possibly vulnerable
warp 3.19-community 0.6.2-r0 knuxify <knuxify@gmail.com> possibly vulnerable
warp edge-community 0.7.0-r0 knuxify <knuxify@gmail.com> possibly vulnerable
warp 3.20-community 0.7.0-r0 knuxify <knuxify@gmail.com> possibly vulnerable