Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-39215
HistorySep 15, 2022 - 9:35 p.m.

CVE-2022-39215 The readDir Endpoint Scope can be Bypassed With Symbolic Links in Tauri

2022-09-1521:35:11
CWE-22
GitHub_M
www.cve.org
1
cve-2022-39215
readdir endpoint
symbolic links
bypassed
tauri
canonicalization
scope
directory listings
file content leakage
upgrade
allowlist

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.3%

Tauri is a framework for building binaries for all major desktop platforms. Due to missing canonicalization when readDir is called recursively, it was possible to display directory listings outside of the defined fs scope. This required a crafted symbolic link or junction folder inside an allowed path of the fs scope. No arbitrary file content could be leaked. The issue has been resolved in version 1.0.6 and the implementation now properly checks if the requested (sub) directory is a symbolic link outside of the defined scope. Users are advised to upgrade. Users unable to upgrade should disable the readDir endpoint in the allowlist inside the tauri.conf.json.

CNA Affected

[
  {
    "product": "tauri",
    "vendor": "tauri-apps",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.0.6"
      }
    ]
  }
]

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.3%

Related for CVELIST:CVE-2022-39215