Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xOXd2LTIybTktdmhxaM4AAvvi
Tauri Filesystem Scope can be Partially Bypassed
Impact
Due to incorrect escaping of special characters in paths selected via the file dialog and drag and drop functionality, it was possible to partially bypass the fs
scope definition. It was not possible to traverse into arbitrary paths, as the issue was limited to neighboring files and sub folders of already allowed paths.
The impact differs on Windows, MacOS and Linux due to different specifications of valid path characters.
On Linux or MacOS based systems it was possible to use the *
, **
and [a-Z]
patterns inside a path, which allowed to read the content of sub directories and single character files in a folder, where only specific files or the directory itself were allowed.
On Windows [a-Z]
was the possible bypass pattern, as *
is not treated as a valid path component. This implies that only single character files inside an already allowed directory were unintentionally accessible.
This bypass depends on the file picker dialog or dragged files, as user selected paths are automatically added to the allow list at runtime.
A successful bypass requires the user to select a pre-existing malicious file or directory during the file picker dialog and an adversary controlled logic to access these files. This means the issue by itself can not be abused and requires further intentional or unintentional privileges.
Workaround
Disable the dialog
and fileDropEnabled
component inside the tauri.conf.json
.
Patches
The issue has been resolved in #5237 and the implementation now properly escapes the special characters. The patch has been included in releases: 1.0.7
, 1.1.2
and 1.2.0
For more information
This issue was initially reported by MessyComposer in #5234.
If you have any questions or comments about this advisory:
Open an issue in tauri
Email us at [email protected]
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xOXd2LTIybTktdmhxaM4AAvvi
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: about 2 years ago
Updated: over 1 year ago
CVSS Score: 2.3
CVSS vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N
Identifiers: GHSA-q9wv-22m9-vhqh, CVE-2022-41874
References:
- https://github.com/tauri-apps/tauri/security/advisories/GHSA-q9wv-22m9-vhqh
- https://github.com/tauri-apps/tauri/issues/5234
- https://github.com/tauri-apps/tauri/pull/5237
- https://nvd.nist.gov/vuln/detail/CVE-2022-41874
- https://rustsec.org/advisories/RUSTSEC-2022-0091.html
- https://github.com/advisories/GHSA-q9wv-22m9-vhqh
Blast Radius: 8.4
Affected Packages
cargo:Tauri
Dependent packages: 107Dependent repositories: 4,409
Downloads: 2,994,610 total
Affected Version Ranges: >= 1.1.0, < 1.1.2, >= 1.0.0, < 1.0.7
Fixed in: 1.1.2, 1.0.7
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.1.0, 1.1.1
All unaffected versions: 0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.2.0, 0.3.0, 0.3.1, 0.3.2, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.6.0, 0.6.2, 0.7.0, 0.7.1, 0.7.2, 0.7.3, 0.7.4, 0.7.5, 0.8.0, 0.9.0, 0.9.1, 0.9.2, 0.10.0, 0.11.0, 0.11.1, 1.0.7, 1.0.8, 1.0.9, 1.1.2, 1.1.3, 1.1.4, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.3.0, 1.4.0, 1.4.1, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.6.4, 1.6.5, 1.6.6, 1.6.7, 1.6.8, 1.7.0, 1.7.1, 1.7.2, 1.8.0, 1.8.1, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6