vendor:
Binwalk
by:
Etienne Lacoche
7.5
CVSS
HIGH
Remote Command Execution (RCE)
78
CWE
Product Name: Binwalk
Affected Version From: 2.1.2b
Affected Version To: 2.3.2002
Patch Exists: YES
Related CWE: CVE-2022-4510
CPE: 2.3.2002
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=140640, https://www.infosecmatter.com/nessus-plugin-library/?id=139491, https://www.infosecmatter.com/nessus-plugin-library/?id=141273, https://www.infosecmatter.com/nessus-plugin-library/?id=140760, https://www.infosecmatter.com/nessus-plugin-library/?id=141328, https://www.infosecmatter.com/nessus-plugin-library/?id=139484, https://www.infosecmatter.com/nessus-plugin-library/?id=141072, https://www.infosecmatter.com/nessus-plugin-library/?id=140657, https://www.infosecmatter.com/nessus-plugin-library/?_page=42
Platforms Tested: Debian 11
2022
Binwalk v2.3.2 – Remote Command Execution (RCE)
Binwalk 2.1.2b through 2.3.2 is vulnerable to a remote command execution vulnerability. An attacker can craft a malicious .png file and send it to the victim, which when opened with Binwalk, will execute arbitrary code on the victim's machine. The exploit is written in Python and uses the netcat utility to open a reverse shell on the victim's machine.
Mitigation:
Upgrade to the latest version of Binwalk, or apply the patch provided by the vendor.