CVE-2022-41874

CVSS V2 None CVSS V3 Medium 4.7
Description
Tauri is a framework for building binaries for all major desktop platforms. In versions prior to 1.0.7 and 1.1.2, Tauri is vulnerable to an Incorrectly-Resolved Name. Due to incorrect escaping of special characters in paths selected via the file dialog and drag and drop functionality, it is possible to partially bypass the `fs` scope definition. It is not possible to traverse into arbitrary paths, as the issue is limited to neighboring files and sub folders of already allowed paths. The impact differs on Windows, MacOS and Linux due to different specifications of valid path characters. This bypass depends on the file picker dialog or dragged files, as user selected paths are automatically added to the allow list at runtime. A successful bypass requires the user to select a pre-existing malicious file or directory during the file picker dialog and an adversary controlled logic to access these files. The issue has been patched in versions 1.0.7, 1.1.2 and 1.2.0. As a workaround, disable the dialog and fileDropEnabled component inside the tauri.conf.json.
Overview
  • CVE ID
  • CVE-2022-41874
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-11-10T21:15:10
  • Last Modified Date
  • 2022-11-15T20:17:18
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:tauri:tauri:*:*:*:*:*:*:*:* 1 OR 1.0.0 1.0.7
cpe:2.3:a:tauri:tauri:*:*:*:*:*:*:*:* 1 OR 1.1.0 1.1.2
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • REQUIRED
  • Scope
  • CHANGED
  • Confidentiality Impact
  • LOW
  • Availability Impact
  • NONE
  • Base Score
  • 4.7
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 2.8
  • Impact Score
  • 1.4
History
Created Old Value New Value Data Type Notes
2022-11-10 22:00:12 Added to TrackCVE
2022-12-07 17:37:11 2022-11-10T21:15Z 2022-11-10T21:15:10 CVE Published Date updated
2022-12-07 17:37:11 2022-11-15T20:17:18 CVE Modified Date updated
2022-12-07 17:37:11 Analyzed Vulnerability Status updated
2022-12-07 17:37:13 CPE Information updated