Miggo Logo

CVE-2021-31155: Permissions bypass in pleaser

7.8

CVSS Score
3.1

Basic Information

EPSS Score
0.0869%
Published
8/25/2021
Updated
4/3/2023
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
pleaserrust< 0.4.00.4.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper umask handling during directory creation. The main function (or its direct dependencies) would appear in stack traces when creating the token directory. While exact function names aren't visible in provided materials, the entrypoint (main) and filesystem API calls would be prominent in profiling. The Openwall analysis explicitly identifies the create_dir_all call path as the vulnerable codepath lacking umask sanitization.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**ilur* to norm*liz* t** um*sk in pl**s*r ***or* *.*.* *llows * lo**l *tt**k*r to **in *ull root privil***s i* t**y *r* *llow** to *x**ut* *t l**st on* *omm*n*.

Reasoning

T** vuln*r**ility st*ms *rom improp*r um*sk **n*lin* *urin* *ir**tory *r**tion. T** m*in *un*tion (or its *ir**t **p*n**n*i*s) woul* *pp**r in st**k tr***s w**n *r**tin* t** tok*n *ir**tory. W*il* *x**t *un*tion n*m*s *r*n't visi*l* in provi*** m*t*r