// For flags

CVE-2022-41874

Tauri Filesystem Scope can be Partially Bypassed

Severity Score

4.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Tauri is a framework for building binaries for all major desktop platforms. In versions prior to 1.0.7 and 1.1.2, Tauri is vulnerable to an Incorrectly-Resolved Name. Due to incorrect escaping of special characters in paths selected via the file dialog and drag and drop functionality, it is possible to partially bypass the `fs` scope definition. It is not possible to traverse into arbitrary paths, as the issue is limited to neighboring files and sub folders of already allowed paths. The impact differs on Windows, MacOS and Linux due to different specifications of valid path characters. This bypass depends on the file picker dialog or dragged files, as user selected paths are automatically added to the allow list at runtime. A successful bypass requires the user to select a pre-existing malicious file or directory during the file picker dialog and an adversary controlled logic to access these files. The issue has been patched in versions 1.0.7, 1.1.2 and 1.2.0. As a workaround, disable the dialog and fileDropEnabled component inside the tauri.conf.json.

Tauri es un framework para crear archivos binarios para las principales plataformas de escritorio. En versiones anteriores a la 1.0.7 y 1.1.2, Tauri es vulnerable a un Nombre Resuelto Incorrectamente. Debido al escape incorrecto de caracteres especiales en las rutas seleccionadas mediante el cuadro de diálogo del archivo y la funcionalidad de arrastrar y soltar, es posible omitir parcialmente la definición de alcance `fs`. No es posible recorrer rutas arbitrarias, ya que el problema se limita a archivos vecinos y subcarpetas de rutas ya permitidas. El impacto difiere en Windows, MacOS y Linux debido a las diferentes especificaciones de caracteres de ruta válidos. Esta omisión depende del cuadro de diálogo del selector de archivos o de los archivos arrastrados, ya que las rutas seleccionadas por el usuario se agregan automáticamente a la lista de permitidos en tiempo de ejecución. Una omisión exitosa requiere que el usuario seleccione un archivo o directorio malicioso preexistente durante el cuadro de diálogo del selector de archivos y una lógica controlada por el adversario para acceder a estos archivos. El problema se solucionó en las versiones 1.0.7, 1.1.2 y 1.2.0. Como workaround, deshabilite el cuadro de diálogo y el componente fileDropEnabled dentro de tauri.conf.json.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-30 CVE Reserved
  • 2022-11-10 CVE Published
  • 2024-04-22 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-668: Exposure of Resource to Wrong Sphere
  • CWE-706: Use of Incorrectly-Resolved Name or Reference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tauri
Search vendor "Tauri"
Tauri
Search vendor "Tauri" for product "Tauri"
>= 1.0.0 < 1.0.7
Search vendor "Tauri" for product "Tauri" and version " >= 1.0.0 < 1.0.7"
-
Affected
Tauri
Search vendor "Tauri"
Tauri
Search vendor "Tauri" for product "Tauri"
>= 1.1.0 < 1.1.2
Search vendor "Tauri" for product "Tauri" and version " >= 1.1.0 < 1.1.2"
-
Affected