Tough provides a set of Rust libraries and tools for using and generating the update framework (TUF) repositories. The tough library, prior to 0.12.0, does not properly sanitize target names when caching a repository, or when saving specific targets to an output directory. When targets are cached or saved, files could be overwritten with arbitrary content anywhere on the system. A fix is available in version 0.12.0. No workarounds to this issue are known.
References
Link | Resource |
---|---|
https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a | Patch Third Party Advisory |
https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485 | Third Party Advisory |
https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a | Patch Third Party Advisory |
https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-10-19 18:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-41149
Mitre link : CVE-2021-41149
CVE.ORG link : CVE-2021-41149
JSON object : View
Products Affected
amazon
- tough
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')