First published: Tue Oct 19 2021(Updated: )
Tough provides a set of Rust libraries and tools for using and generating the update framework (TUF) repositories. The tough library, prior to 0.12.0, does not properly sanitize target names when caching a repository, or when saving specific targets to an output directory. When targets are cached or saved, files could be overwritten with arbitrary content anywhere on the system. A fix is available in version 0.12.0. No workarounds to this issue are known.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Tough | <0.12.0 | |
<0.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41149 is a vulnerability in the tough library, versions prior to 0.12.0, which does not properly sanitize target names when caching a repository or when saving specific targets to an output directory.
CVE-2021-41149 affects Amazon Tough versions prior to 0.12.0.
CVE-2021-41149 has a severity rating of 8.1 (high).
To fix CVE-2021-41149, users should update to version 0.12.0 or later of the tough library.
You can find more information about CVE-2021-41149 on the GitHub page for awslabs/tough, as well as in the associated security advisory.