Lucene search

K
cve[email protected]CVE-2024-38358
HistoryJun 19, 2024 - 8:15 p.m.

CVE-2024-38358

2024-06-1920:15:11
CWE-22
web.nvd.nist.gov
22
wasmer
runtime
vulnerability
preopened directory
symlink
traversal
wasi
emscripten
cve-2024-38358
commit
b9483d022
release 4.3.2
upgrade

2.9 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

3.9 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

Wasmer is a web assembly (wasm) Runtime supporting WASIX, WASI and Emscripten. If the preopened directory has a symlink pointing outside, WASI programs can traverse the symlink and access host filesystem if the caller sets both oflags::creat and rights::fd_write. Programs can also crash the runtime by creating a symlink pointing outside with path_symlink and path_opening the link. This issue has been addressed in commit b9483d022 which has been included in release version 4.3.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

Vulners
Node
wasmeriowasmerRange<4.3.2

CNA Affected

[
  {
    "vendor": "wasmerio",
    "product": "wasmer",
    "versions": [
      {
        "version": "< 4.3.2",
        "status": "affected"
      }
    ]
  }
]

2.9 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

3.9 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

Related for CVE-2024-38358