Discover how the CVE-2021-41150 vulnerability in Tough library versions prior to 0.12.0 allows file overwriting with role metadata. Learn about the impact, affected systems, and mitigation steps.
Tough provides a set of Rust libraries and tools for using and generating the update framework (TUF) repositories. The tough library, prior to version 0.12.0, does not properly sanitize delegated role names, leading to potential file overwriting vulnerabilities anywhere on the system. This CVE addresses the improper sanitization of delegated role names in tough.
Understanding CVE-2021-41150
What is CVE-2021-41150?
The vulnerability in Tough library versions prior to 0.12.0 allows malicious actors to overwrite files with role metadata by exploiting improper sanitization of delegated role names during repository caching or loading.
The Impact of CVE-2021-41150
The vulnerability has a CVSS v3.1 base score of 8.2 (High), affecting confidentiality, integrity, and leading to potential file manipulation. Attack complexity is high with low privileges required but no user interaction needed.
Technical Details of CVE-2021-41150
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates