← Zuruck zu CVEs
CVE-2026-6968
MEDIUM5.9
Beschreibung
Incomplete path traversal fixes in awslabs/tough before tough-v0.22.0 allow remote authenticated users with delegated signing authority to write files outside intended output directories via absolute target names in copy_target/link_target, symlinked parent directories in save_target, or symlinked metadata filenames in SignedRole::write, because write paths trust the joined destination path without post-resolution containment verification. We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
CVE Details
CVSS v3.1 Bewertung5.9
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
AngriffsvektorNETWORK
KomplexitatHIGH
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht4/24/2026
Zuletzt geandert4/24/2026
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-22
Referenzen
https://aws.amazon.com/security/security-bulletins/2026-019-aws/(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://crates.io/crates/tough/0.22.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://crates.io/crates/tuftool/0.15.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/awslabs/tough/releases/tag/tough-v0.22.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/awslabs/tough/releases/tag/tuftool-v0.15.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/awslabs/tough/security/advisories/GHSA-v57p-gppj-p9vg(ff89ba41-3aa1-4d27-914a-91399e9639e5)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.