
Zoom has shipped patches for high severity vulnerabilities that expose enterprise users to remote code execution and command injection attacks with connection with Keybase connector client
The network proxy page on the web portal for the products fails to validate input sent in requests to set the network proxy password. This could lead to remote command injection by a web portal administrator.
The CVE-2021-34417 with CVSS Base Score of 7.9, affects multiple Zoom software components — Zoom On-Premise Meeting Connector Controller, Zoom On-Premise Meeting Connector MMR, Zoom On-Premise Recording Connector, Zoom On-Premise Virtual Room Connector.
A second high-severity bulletin was also released with patches for CVE-2021-34422, a path traversal bug affecting Keybase Client for Windows.
The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine.If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.
Zoom’s security response team also shipped patches for a medium risk bug (CVE-2021-34420) in the Zoom Client for Meetings installer. The Zoom Client for Meetings for Windows installer before version 5.5.4 does not properly verify the signature of files with .msi, .ps1, and .bat extensions. This could lead to a malicious actor installing malicious software on a customer’s computer.
Users are urged to manually check for software updates within the Zoom client. Since no automatic updation happens.