Tough provides a set of Rust libraries and tools for using and generating the update framework (TUF) repositories. The tough library, prior to 0.12.0, does not properly sanitize target names when caching a repository, or when saving specific targets to an output directory. When targets are cached or saved, files could be overwritten with arbitrary content anywhere on the system. A fix is available in version 0.12.0. No workarounds to this issue are known.
References
Link | Resource |
---|---|
https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485 | Third Party Advisory |
https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a | Patch Third Party Advisory |
Configurations
Information
Published : 2021-10-19 11:15
Updated : 2021-10-25 08:00
NVD link : CVE-2021-41149
Mitre link : CVE-2021-41149
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
amazon
- tough