CVE-2022-39215
September 15, 2022
Tauri is a framework for building binaries for all major desktop platforms. Due to missing canonicalization when "readDir" is called recursively, it was possible to display directory listings outside of the defined "fs" scope. This required a crafted symbolic link or junction folder inside an allowed path of the "fs" scope. No arbitrary file content could be leaked. The issue has been resolved in version 1.0.6 and the implementation now properly checks if the requested (sub) directory is a symbolic link outside of the defined "scope". Users are advised to upgrade. Users unable to upgrade should disable the "readDir" endpoint in the "allowlist" inside the "tauri.conf.json".
Related ResourcesĀ (11)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
LOW
Vulnerable System Availability
LOW
Subsequent System Confidentiality
LOW
Subsequent System Integrity
LOW
Subsequent System Availability
LOW
CVSS v3
Base Score:
8.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
LOW
Weakness Type (CWE)
EPSS
Base Score:
0.45