Executive Summary

Informations
Name CVE-2024-38358 First vendor Publication 2024-06-19
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Wasmer is a web assembly (wasm) Runtime supporting WASIX, WASI and Emscripten. If the preopened directory has a symlink pointing outside, WASI programs can traverse the symlink and access host filesystem if the caller sets both `oflags::creat` and `rights::fd_write`. Programs can also crash the runtime by creating a symlink pointing outside with `path_symlink` and `path_open`ing the link. This issue has been addressed in commit `b9483d022` which has been included in release version 4.3.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38358

Sources (Detail)

https://github.com/wasmerio/wasmer/commit/b9483d022c602b994103f78ecfe46f017f8...
https://github.com/wasmerio/wasmer/security/advisories/GHSA-55f3-3qvg-8pv5
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2024-11-25 09:24:39
  • Multiple Updates
2024-06-20 17:27:36
  • Multiple Updates
2024-06-20 00:27:24
  • First insertion