CVE-2021-41150 – tough
Package
Manager: cargo
Name: tough
Vulnerable Version: >=0 <0.12.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
EPSS: 0.00524 pctl0.66036
Details
Improper sanitization of delegated role names ### Impact The tough library, prior to 0.12.0, does not properly sanitize delegated role names when caching a repository, or when loading a repository from the filesystem. When the repository is cached or loaded, files ending with the .json extension could be overwritten with role metadata anywhere on the system. AWS would like to thank https://github.com/jku for reporting this issue. ### Patches A fix is available in version 0.12.0. ### Workarounds No workarounds to this issue are known. ### References https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr
Metadata
Created: 2021-10-19T20:16:26Z
Modified: 2021-10-19T18:06:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/10/GHSA-r56q-vv3c-6g9c/GHSA-r56q-vv3c-6g9c.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-r56q-vv3c-6g9c
Finding: F063
Auto approve: 1