← Voltar para CVEs
CVE-2026-6968
MEDIUM5.9
Descricao
Incomplete path traversal fixes in awslabs/tough before tough-v0.22.0 allow remote authenticated users with delegated signing authority to write files outside intended output directories via absolute target names in copy_target/link_target, symlinked parent directories in save_target, or symlinked metadata filenames in SignedRole::write, because write paths trust the joined destination path without post-resolution containment verification. We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
Detalhes CVE
Pontuacao CVSS v3.15.9
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado4/24/2026
Ultima modificacao4/24/2026
Fontenvd
Avistamentos honeypot0
Fraquezas (CWE)
CWE-22
Referencias
https://aws.amazon.com/security/security-bulletins/2026-019-aws/(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://crates.io/crates/tough/0.22.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://crates.io/crates/tuftool/0.15.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/awslabs/tough/releases/tag/tough-v0.22.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/awslabs/tough/releases/tag/tuftool-v0.15.0(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/awslabs/tough/security/advisories/GHSA-v57p-gppj-p9vg(ff89ba41-3aa1-4d27-914a-91399e9639e5)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.