It was discovered that the installation packages of the Zoom Client for Meetings for MacOS (Standard and for IT Admin) installation before version 5.2.0, Zoom Client Plugin for Sharing iPhone/iPad before version 5.2.0, and Zoom Rooms for Conference before version 5.1.0, copy pre- and post- installation shell scripts to a user-writable directory. In the affected products listed below, a malicious actor with local access to a users machine could use this flaw to potentially run arbitrary system commands in a higher privileged context during the installation process.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Meetings | Zoom | * | 5.2.0 (excluding) |
Rooms | Zoom | * | 5.1.0 (excluding) |
Screen_sharing | Zoom | * | 5.2.0 (excluding) |