Vulnerability Description
Tough provides a set of Rust libraries and tools for using and generating the update framework (TUF) repositories. The tough library, prior to 0.12.0, does not properly sanitize target names when caching a repository, or when saving specific targets to an output directory. When targets are cached or saved, files could be overwritten with arbitrary content anywhere on the system. A fix is available in version 0.12.0. No workarounds to this issue are known.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Amazon | Tough | < 0.12.0 |
Related Weaknesses (CWE)
References
- https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9aPatchThird Party Advisory
- https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485Third Party Advisory
- https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9aPatchThird Party Advisory
- https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485Third Party Advisory
FAQ
What is CVE-2021-41149?
CVE-2021-41149 is a vulnerability with a CVSS score of 8.2 (HIGH). Tough provides a set of Rust libraries and tools for using and generating the update framework (TUF) repositories. The tough library, prior to 0.12.0, does not properly sanitize target names when cach...
How severe is CVE-2021-41149?
CVE-2021-41149 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-41149?
Check the references section above for vendor advisories and patch information. Affected products include: Amazon Tough.