icon

We found results for “

CVE-2022-39215

Date: September 15, 2022

Tauri is a framework for building binaries for all major desktop platforms. Due to missing canonicalization when "readDir" is called recursively, it was possible to display directory listings outside of the defined "fs" scope. This required a crafted symbolic link or junction folder inside an allowed path of the "fs" scope. No arbitrary file content could be leaked. The issue has been resolved in version 1.0.6 and the implementation now properly checks if the requested (sub) directory is a symbolic link outside of the defined "scope". Users are advised to upgrade. Users unable to upgrade should disable the "readDir" endpoint in the "allowlist" inside the "tauri.conf.json".

Language: RUST

Severity Score

Severity Score

Weakness Type (CWE)

Improper Link Resolution Before File Access ('Link Following')

CWE-59

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-22

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): LOW

Do you need more information?

Contact Us