// For flags

CVE-2022-39215

The readDir Endpoint Scope can be Bypassed With Symbolic Links in Tauri

Severity Score

5.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Tauri is a framework for building binaries for all major desktop platforms. Due to missing canonicalization when `readDir` is called recursively, it was possible to display directory listings outside of the defined `fs` scope. This required a crafted symbolic link or junction folder inside an allowed path of the `fs` scope. No arbitrary file content could be leaked. The issue has been resolved in version 1.0.6 and the implementation now properly checks if the requested (sub) directory is a symbolic link outside of the defined `scope`. Users are advised to upgrade. Users unable to upgrade should disable the `readDir` endpoint in the `allowlist` inside the `tauri.conf.json`.

Tauri es un framework para construir binarios para las principales plataformas de escritorio. Debido a una falta de canonización cuando es llamada recursivamente a "readDir", era posible mostrar listados de directorios fuera del ámbito definido de "fs". Esto requería un enlace simbólico diseñado o una carpeta de unión dentro de una ruta permitida del ámbito "fs". No se podía filtrar contenido de archivos arbitrarios. El problema ha sido resuelto en versión 1.0.6 y la implementación ahora comprueba apropiadamente si el (sub)directorio solicitado es un enlace simbólico fuera del ámbito definido. Es recomendado a usuarios actualizar. Los usuarios que no puedan actualizarse deberán deshabilitar el endpoint "readDir" en "allowlist" dentro de "tauri.conf.json"

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-02 CVE Reserved
  • 2022-09-15 CVE Published
  • 2024-04-07 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tauri
Search vendor "Tauri"
Tauri
Search vendor "Tauri" for product "Tauri"
< 1.0.6
Search vendor "Tauri" for product "Tauri" and version " < 1.0.6"
-
Affected