CVE-2022-4510

HIGH

Microsoft Binwalk < 2.3.3 - Path Traversal

Title source: rule

Description

A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.3.3 included. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction, would extract a malicious binwalk module into the folder .config/binwalk/plugins. This vulnerability is associated with program files src/binwalk/plugins/unpfs.py. This issue affects binwalk from 2.1.2b through 2.3.3 included.

Exploits (4)

exploitdb WORKING POC
by Etienne Lacoche · pythonremotepython
https://www.exploit-db.com/exploits/51249
nomisec WORKING POC 14 stars
by adhikara13 · poc
https://github.com/adhikara13/CVE-2022-4510-WalkingPath
nomisec WORKING POC 9 stars
by electr0sm0g · poc
https://github.com/electr0sm0g/CVE-2022-4510
nomisec WORKING POC 1 stars
by Kalagious · poc
https://github.com/Kalagious/BadPfs-CVE-2022-4510

Scores

CVSS v3 7.8
EPSS 0.4409
EPSS Percentile 97.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-22
Status published
Products (2)
microsoft/binwalk 2.2.0 - 2.3.3
pypi/binwalk 2.1.2bPyPI
Published Jan 26, 2023
Tracked Since Feb 18, 2026