Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:vmware:installbuilder:*:*:*:*:*:windows:*:*", "matchCriteriaId": "11DF34E9-7BCA-48D3-9B1D-A146D7B34769", "versionEndExcluding": "21.6.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "On Windows, the uninstaller binary copies itself to a fixed temporary location, which is then executed (the originally called uninstaller exits, so it does not block the installation directory). This temporary location is not randomized and does not restrict access to Administrators only so a potential attacker could plant a binary to replace the copied binary right before it gets called, thus gaining Administrator privileges (if the original uninstaller was executed as Administrator). The vulnerability only affects Windows installers."}, {"lang": "es", "value": "En Windows, el binario del desinstalador se copia a s\u00ed mismo en una ubicaci\u00f3n temporal fija, que luego es ejecutada (el desinstalador originalmente llamado sale, por lo que no bloquea el directorio de instalaci\u00f3n). Esta ubicaci\u00f3n temporal no es aleatoria y no restringe el acceso s\u00f3lo a administradores, por lo que un potencial atacante podr\u00eda plantar un binario para reemplazar el binario copiado justo antes de que sea llamado, obteniendo as\u00ed privilegios de administrador (si el desinstalador original fue ejecutado como administrador). La vulnerabilidad s\u00f3lo afecta a los instaladores de Windows"}], "id": "CVE-2021-22038", "lastModified": "2024-11-21T05:49:28.933", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-10-29T12:15:07.617", "references": [{"source": "security@vmware.com", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://blog.installbuilder.com/2021/10/installbuilder-2160-released.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://blog.installbuilder.com/2021/10/installbuilder-2160-released.html"}], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-330"}], "source": "nvd@nist.gov", "type": "Primary"}]}