← Retour aux CVEs
CVE-2026-6968
MEDIUM5.9
Description
Incomplete path traversal fixes in awslabs/tough before tough-v0.22.0 allow remote authenticated users with delegated signing authority to write files outside intended output directories via absolute target names in copy_target/link_target, symlinked parent directories in save_target, or symlinked metadata filenames in SignedRole::write, because write paths trust the joined destination path without post-resolution containment verification. We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
Details CVE
Score CVSS v3.15.9
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisLOW
Interaction utilisateurNONE
Publie4/24/2026
Derniere modification4/24/2026
Sourcenvd
Observations honeypot0
Faiblesses (CWE)
CWE-22
References
https://aws.amazon.com/security/security-bulletins/2026-019-aws/(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://crates.io/crates/tough/0.22.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://crates.io/crates/tuftool/0.15.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/awslabs/tough/releases/tag/tough-v0.22.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/awslabs/tough/releases/tag/tuftool-v0.15.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/awslabs/tough/security/advisories/GHSA-v57p-gppj-p9vg(ff89ba41-3aa1-4d27-914a-91399e9639e5)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.