Dima2021 / cargo-audit

Audit Cargo.lock files for crates with security vulnerabilities
https://rustsec.org/
Apache License 2.0
0 stars 0 forks source link

WS-2023-0045 (Medium) detected in remove_dir_all-0.5.3.crate - autoclosed #40

Closed mend-for-github-com[bot] closed 1 year ago

mend-for-github-com[bot] commented 1 year ago

WS-2023-0045 - Medium Severity Vulnerability

Vulnerable Library - remove_dir_all-0.5.3.crate

A safe, reliable implementation of remove_dir_all for Windows

Library home page: https://crates.io/api/v1/crates/remove_dir_all/0.5.3/download

Dependency Hierarchy: - tempfile-3.2.0.crate (Root Library) - :x: **remove_dir_all-0.5.3.crate** (Vulnerable Library)

Found in base branch: main

Vulnerability Details

The remove_dir_all crate is a Rust library that offers additional features over the Rust standard library fs::remove_dir_all function. It suffers the same class of failure as the code it was layering over: TOCTOU race conditions, with the ability to cause arbitrary paths to be deleted by substituting a symlink for a path after the type of the path was checked.

Publish Date: 2023-02-24

URL: WS-2023-0045

CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-mc8h-8q98-g5hr

Release Date: 2023-02-24

Fix Resolution: remove_dir_all - 0.8.0

mend-for-github-com[bot] commented 1 year ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.