CVE-2022-39215: Tauri's readDir Endpoint Scope can be Bypassed With Symbolic Links
(updated )
Due to missing canonicalization when readDir
is called recursively, it was possible to display directory listings outside of the defined fs
scope. This required a crafted symbolic link or junction folder inside an allowed path of the fs
scope. No arbitrary file content could be leaked.
References
- github.com/advisories/GHSA-28m8-9j7v-x499
- github.com/tauri-apps/tauri
- github.com/tauri-apps/tauri/commit/bb178829086e80916f9be190f02d83bc25802799
- github.com/tauri-apps/tauri/issues/4882
- github.com/tauri-apps/tauri/pull/5123
- github.com/tauri-apps/tauri/pull/5123/commits/1f9b9e8d26a2c915390323e161020bcb36d44678
- github.com/tauri-apps/tauri/releases/tag/tauri-v1.0.6
- github.com/tauri-apps/tauri/security/advisories/GHSA-28m8-9j7v-x499
- nvd.nist.gov/vuln/detail/CVE-2022-39215
- rustsec.org/advisories/RUSTSEC-2022-0088.html
Detect and mitigate CVE-2022-39215 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →