CVE-2021-41149

Tough provides a set of Rust libraries and tools for using and generating the update framework (TUF) repositories. The tough library, prior to 0.12.0, does not properly sanitize target names when caching a repository, or when saving specific targets to an output directory. When targets are cached or saved, files could be overwritten with arbitrary content anywhere on the system. A fix is available in version 0.12.0. No workarounds to this issue are known.
Configurations

Configuration 1 (hide)

cpe:2.3:a:amazon:tough:*:*:*:*:*:rust:*:*

History

21 Nov 2024, 06:25

Type Values Removed Values Added
CVSS v2 : 8.5
v3 : 8.1
v2 : 8.5
v3 : 8.2
References () https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a - Patch, Third Party Advisory () https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a - Patch, Third Party Advisory
References () https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485 - Third Party Advisory () https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485 - Third Party Advisory

Information

Published : 2021-10-19 18:15

Updated : 2024-11-21 06:25


NVD link : CVE-2021-41149

Mitre link : CVE-2021-41149

CVE.ORG link : CVE-2021-41149


JSON object : View

Products Affected

amazon

  • tough
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')