Skip to content

Improper Input Validation in fruity

High severity GitHub Reviewed Published Nov 16, 2021 to the GitHub Advisory Database • Updated Jun 13, 2023

Package

cargo fruity (Rust)

Affected versions

>= 0.1.0, < 0.3.0

Patched versions

0.3.0

Description

Methods of NSString for conversion to a string may return a partial result. Since they call CStr::from_ptr on a pointer to the string buffer, the string is terminated at the first null byte, which might not be the end of the string.

In addition to the vulnerable functions listed for this issue, the implementations of Display, PartialEq, PartialOrd, and ToString for NSString are also affected, since they call those functions.

Since NSString is commonly used as the type for paths by the Foundation framework, null byte truncation might allow for easily bypassing file extension checks. For example, if a file name is provided by a user and validated to have one of a specific set of extensions, with validation taking place before truncation, an attacker can add an accepted extension after a null byte (e.g., file.exe\0.txt). After truncation, the file name used by the application would be file.exe.

It would be better to generate unique names for files, instead of using user-provided names, but not all applications take this approach.

References

Published by the National Vulnerability Database Nov 15, 2021
Reviewed Nov 16, 2021
Published to the GitHub Advisory Database Nov 16, 2021
Last updated Jun 13, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Weaknesses

CVE ID

CVE-2021-43620

GHSA ID

GHSA-h352-g5vw-3926

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.