Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-6968— Multiple Path Traversal Variants in awslabs/tough

CVSS 5.9 · Medium EPSS 0.08% · P23
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-6968

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Multiple Path Traversal Variants in awslabs/tough
Source: NVD (National Vulnerability Database)
Vulnerability Description
Incomplete path traversal fixes in awslabs/tough before tough-v0.22.0 allow remote authenticated users with delegated signing authority to write files outside intended output directories via absolute target names in copy_target/link_target, symlinked parent directories in save_target, or symlinked metadata filenames in SignedRole::write, because write paths trust the joined destination path without post-resolution containment verification. We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Amazon tough 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Amazon tough是美国亚马逊(Amazon)公司的 一个The Update Framework(TUF) 存储库的 Rust 客户端库。 tough tough-v0.22.0之前版本存在路径遍历漏洞,该漏洞源于路径遍历修复不完整,可能导致远程认证用户通过绝对目标名称、符号链接父目录或符号链接元数据文件名写入预期输出目录之外的文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
AWStough--
AWStuftool--

II. Public POCs for CVE-2026-6968

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-6968

登录查看更多情报信息。

Same Patch Batch · AWS · 2026-04-24 · 5 CVEs total

CVE-2026-69119.8 CRITICALAuthentication Bypass via Missing JWT Signature Verification in AWS Ops Wheel
CVE-2026-69128.8 HIGHPrivilege Escalation via Self-Writable Cognito Custom Attribute in AWS Ops Wheel
CVE-2026-69675.9 MEDIUMMissing Delegated Metadata Validation in awslabs/tough
CVE-2026-69665.3 MEDIUMSignature Threshold Bypass in awslabs/tough Delegated Roles

IV. Related Vulnerabilities

V. Comments for CVE-2026-6968

No comments yet


Leave a comment