CVE-2023-51661: Wasmer filesystem sandbox not enforced
8.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50317%
CWE
Published
12/13/2023
Updated
1/3/2024
KEV Status
No
Technology
Rust
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| wasmer-cli | rust | >= 3.0.0, < 4.2.4 | 4.2.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper filesystem sandboxing in WASI directory mapping. The key functions are in the Wasi command handler where:
- The prepare() method set up environment without properly restricting default directory access
- build_mapped_directories() handled path mapping logic but previously allowed:
- Implicit current directory mapping to host FS
- Absolute path validation issues
- Duplicate directory mapping checks These functions were modified in the patched commit to add proper sandbox enforcement through the MAPPED_CURRENT_DIR_DEFAULT_PATH constant and strict path validation, indicating they were the source of the vulnerability.