Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4mq4-7rw3-vm5j

Опубликовано: 13 дек. 2023
Источник: github
Github: Прошло ревью
CVSS3: 8.4

Описание

Wasmer filesystem sandbox not enforced

Summary

As of Wasmer version v4.2.3, Wasm programs can access the filesystem outside of the sandbox.

Details

https://github.com/wasmerio/wasmer/issues/4267

PoC

A minimal Rust program:

fn main() { let f = std::fs::OpenOptions::new() .write(true) .create_new(true) .open("abc") .unwrap(); }

This should be compiled with cargo build --target wasm32-wasi. The compiled program, when run with wasmer WITHOUT --dir, can still create a file in the working directory.

Impact

Service providers running untrusted Wasm code on Wasmer can unexpectedly expose the host filesystem.

Пакеты

Наименование

wasmer-cli

rust
Затронутые версииВерсия исправления

>= 3.0.0, < 4.2.4

4.2.4

EPSS

Процентиль: 57%
0.00354
Низкий

8.4 High

CVSS3

Дефекты

CWE-284

Связанные уязвимости

CVSS3: 8.4
nvd
около 2 лет назад

Wasmer is a WebAssembly runtime that enables containers to run anywhere: from Desktop to the Cloud, Edge and even the browser. Wasm programs can access the filesystem outside of the sandbox. Service providers running untrusted Wasm code on Wasmer can unexpectedly expose the host filesystem. This vulnerability has been patched in version 4.2.4.

EPSS

Процентиль: 57%
0.00354
Низкий

8.4 High

CVSS3

Дефекты

CWE-284