Lucene search

K
githubGitHub Advisory DatabaseGHSA-28M8-9J7V-X499
HistorySep 16, 2022 - 7:28 p.m.

Tauri's readDir Endpoint Scope can be Bypassed With Symbolic Links

2022-09-1619:28:49
CWE-22
CWE-59
GitHub Advisory Database
github.com
19
tauri
readdir endpoint
symbolic links
directory listings
security advisory

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

EPSS

0.001

Percentile

42.2%

Impact

Due to missing canonicalization when readDir is called recursively, it was possible to display directory listings outside of the defined fs scope. This required a crafted symbolic link or junction folder inside an allowed path of the fs scope. No arbitrary file content could be leaked.

Patches

The issue has been resolved in https://github.com/tauri-apps/tauri/pull/5123 and the implementation now properly checks if the
requested (sub) directory is a symbolic link outside of the defined scope.

Workarounds

Disable the readDir endpoint in the allowlist inside the tauri.conf.json.

For more information

This issue was initially reported by martin-ocasek in #4882.

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
tauritauriRange<1.0.6
VendorProductVersionCPE
tauritauri*cpe:2.3:a:tauri:tauri:*:*:*:*:*:*:*:*

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

EPSS

0.001

Percentile

42.2%

Related for GHSA-28M8-9J7V-X499