- Reported
-
- Issued
-
- Package
-
std
- Type
-
Vulnerability
- Categories
-
- References
-
- CVSS Score
- 7.3
HIGH
- CVSS Details
-
- Attack Vector
- Local
- Attack Complexity
- Low
- Privileges Required
- Low
- User Interaction
- None
- Scope
- Changed
- Confidentiality Impact
- None
- Integrity Impact
- Low
- Availability Impact
- High
- CVSS Vector
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
- Patched
-
- Affected Functions
- Version
std::fs::remove_dir_all
-
Description
In the standard library in Rust before 1.58.1, an attacker with unprivileged access to a system could trick a privileged program using std::fs::remove_dir_all into deleting files they don't have access to delete by creating a symlink in a directory that would be removed by a std::fs::remove_dir_all call due to a Time-of-check time-of-use race condition around this function's check for symbolic links. The function should remove the symbolic links rather than recursively deleting the linked file or directory.
Advisory available under CC0-1.0
license.