CVE-2022-41793

9.8 CRITICAL

📋 TL;DR

This vulnerability allows arbitrary code execution through an out-of-bounds write in Open Babel's CSR format title functionality. Attackers can trigger it by providing a specially crafted malformed file. Users of Open Babel 3.1.1 and development versions are affected.

💻 Affected Systems

Products:
  • Open Babel
Versions: 3.1.1 and development versions including master commit 530dbfa3
Operating Systems: All platforms running Open Babel
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using Open Babel to process CSR format files is vulnerable. This includes cheminformatics software, molecular modeling tools, and chemical file converters.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Remote code execution allowing attackers to run arbitrary commands, install malware, or pivot to other systems.

🟢

If Mitigated

Limited impact with proper file validation and execution restrictions, potentially only causing application crashes.

🌐 Internet-Facing: HIGH - Attackers can exploit this remotely by uploading malicious files to systems processing CSR format files.
🏢 Internal Only: MEDIUM - Requires user interaction to open malicious files, but could still be exploited through phishing or shared files.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires a malicious file to be processed, which can be delivered via email, downloads, or file uploads. No authentication is needed to trigger the vulnerability once the file is processed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Open Babel 3.1.2 or later

Vendor Advisory: https://github.com/openbabel/openbabel/security/advisories

Restart Required: Yes

Instructions:

1. Check current Open Babel version. 2. Update to version 3.1.2 or later using your package manager or from source. 3. Restart any services using Open Babel. 4. Recompile any applications linked against Open Babel libraries.

🔧 Temporary Workarounds

Disable CSR format processing

all

Remove or disable CSR format support in Open Babel configuration

# Modify Open Babel configuration to exclude CSR format
# Check documentation for format-specific disable options

File validation and sanitization

all

Implement strict file validation before processing with Open Babel

# Implement file type verification and size limits
# Use file sanitization libraries before passing to Open Babel

🧯 If You Can't Patch

  • Implement strict input validation for all files processed by Open Babel
  • Run Open Babel in sandboxed/containerized environments with minimal privileges

🔍 How to Verify

Check if Vulnerable:

Check Open Babel version with 'obabel --version' or 'openbabel --version'. If version is 3.1.1 or development version from before the fix, you are vulnerable.

Check Version:

obabel --version

Verify Fix Applied:

After updating, verify version is 3.1.2 or later. Test with known safe CSR files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing CSR files
  • Unusual process spawning from Open Babel
  • Memory access violations in system logs

Network Indicators:

  • Unexpected outbound connections from systems running Open Babel
  • File uploads to systems using Open Babel

SIEM Query:

process_name:"obabel" OR process_name:"openbabel" AND (event_type:"crash" OR event_type:"memory_violation")

🔗 References

📤 Share & Export