RUSTSEC-2020-0030

Source
https://rustsec.org/advisories/RUSTSEC-2020-0030
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2020-0030.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2020-0030
Aliases
Published
2020-08-18T12:00:00Z
Modified
2023-11-08T04:03:37.376395Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
Missing sanitization in mozwire allows local file overwrite of files ending in .conf
Details

The client software downloaded a list of servers from mozilla's servers and created local files named after the hostname field in the json document.

No verification of the content of the string was made, and it could therefore have included '../' leading to path traversal.

This allows an attacker in control of mozilla's servers to overwrite/create local files named .conf.

The flaw was corrected by sanitizing the hostname field.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / mozwire

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
0.4.2-0

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [],
        "arch": []
    }
}

Database specific

{
    "cvss": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
    "informational": null,
    "categories": []
}