CVE-2024-38358
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
19/06/2024
Last modified:
15/04/2026
Description
Wasmer is a web assembly (wasm) Runtime supporting WASIX, WASI and Emscripten. If the preopened directory has a symlink pointing outside, WASI programs can traverse the symlink and access host filesystem if the caller sets both `oflags::creat` and `rights::fd_write`. Programs can also crash the runtime by creating a symlink pointing outside with `path_symlink` and `path_open`ing the link. This issue has been addressed in commit `b9483d022` which has been included in release version 4.3.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Impact
Base Score 3.x
2.90
Severity 3.x
LOW
References to Advisories, Solutions, and Tools
- https://github.com/wasmerio/wasmer/commit/b9483d022c602b994103f78ecfe46f017f8ac662
- https://github.com/wasmerio/wasmer/security/advisories/GHSA-55f3-3qvg-8pv5
- https://github.com/wasmerio/wasmer/commit/b9483d022c602b994103f78ecfe46f017f8ac662
- https://github.com/wasmerio/wasmer/security/advisories/GHSA-55f3-3qvg-8pv5



