Skip to main content

CVE-2022-45145: n/a in n/a

Critical
VulnerabilityCVE-2022-45145cvecve-2022-45145n-acwe-78
Published: Sat Dec 10 2022 (12/10/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

egg-compile.scm in CHICKEN 5.x before 5.3.1 allows arbitrary OS command execution during package installation via escape characters in a .egg file.

AI-Powered Analysis

AILast updated: 06/21/2025, 17:40:14 UTC

Technical Analysis

CVE-2022-45145 is a critical vulnerability affecting the egg-compile.scm component in CHICKEN Scheme versions prior to 5.3.1. CHICKEN Scheme is a compiler for the Scheme programming language, widely used for scripting and application development. The vulnerability arises during the package installation process, specifically when processing .egg files, which are package archives used by CHICKEN Scheme. An attacker can craft a malicious .egg file containing escape characters that are improperly handled by egg-compile.scm, leading to arbitrary operating system command execution. This means that when a user installs a compromised package, the attacker's commands can be executed on the host system without any authentication or user interaction. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that input is not properly sanitized before being passed to system-level commands. The CVSS v3.1 score is 9.8 (critical), reflecting the high impact on confidentiality, integrity, and availability, combined with ease of exploitation (network vector, no privileges or user interaction required). No known exploits in the wild have been reported as of the publication date (December 10, 2022), but the severity and nature of the flaw make it a significant risk for environments using vulnerable CHICKEN Scheme versions. No official patch links were provided in the source, but upgrading to version 5.3.1 or later is implied as the remediation step.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for those relying on CHICKEN Scheme for automation, scripting, or application development. Successful exploitation allows attackers to execute arbitrary commands remotely, potentially leading to full system compromise. This can result in data breaches, disruption of critical services, and lateral movement within networks. Confidentiality is at high risk due to possible data exfiltration; integrity can be compromised by unauthorized modification of files or system configurations; availability may be affected if attackers deploy ransomware or disrupt essential processes. Given the lack of authentication and user interaction requirements, attackers can automate exploitation at scale. Organizations in sectors such as finance, manufacturing, research, and government, where CHICKEN Scheme might be used for specialized applications, are particularly vulnerable. The absence of known exploits in the wild does not diminish the urgency, as public disclosure increases the likelihood of weaponization by threat actors.

Mitigation Recommendations

1. Immediate upgrade to CHICKEN Scheme version 5.3.1 or later where the vulnerability is patched. 2. Implement strict validation and sandboxing of package installations, especially when installing .egg files from untrusted sources. 3. Employ network-level controls to restrict access to package repositories and limit outbound command execution capabilities from build or deployment environments. 4. Monitor logs for unusual command execution patterns or package installation activities. 5. Use application whitelisting to prevent unauthorized execution of unexpected binaries or scripts. 6. Educate developers and system administrators about the risks of installing packages from unverified sources and encourage use of cryptographic verification of package integrity. 7. In environments where immediate upgrade is not feasible, consider isolating CHICKEN Scheme execution within containers or virtual machines with minimal privileges to limit potential damage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9847c4522896dcbf5b77

Added to database: 5/21/2025, 9:09:27 AM

Last enriched: 6/21/2025, 5:40:14 PM

Last updated: 8/12/2025, 4:10:54 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats