Description
Incomplete path traversal fixes in awslabs/tough before tough-v0.22.0 allow remote authenticated users with delegated signing authority to write files outside intended output directories via absolute target names in copy_target/link_target, symlinked parent directories in save_target, or symlinked metadata filenames in SignedRole::write, because write paths trust the joined destination path without post-resolution containment verification.

We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
Published: 2026-04-24
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file write via directory traversal
Action: Patch Immediately
AI Analysis

Impact

Awslabs/tough suffered from incomplete path traversal protection. The flaw permits remote authenticated users that have delegated signing authority to write files outside designated output directories by supplying absolute target names in copy_target, link_target, or symlinked parents in save_target, as well as symlinked metadata filenames in SignedRole::write. This unchecked path resolution allows an attacker to overwrite files outside the intended directories, impacting confidentiality and integrity.

Affected Systems

Affected products are the AWS tough and tuftool libraries. Versions prior to tough‑v0.22.0 and tuftool‑v0.15.0 are vulnerable. Administrators should verify that the currently deployed binaries are older than these releases.

Risk and Exploitability

With a CVSS of 7.1 the vulnerability is considered moderate to high risk, but the EPSS is below 1 % and the issue is not in the CISA KEV catalog, indicating a low current exploitation rate. Attackers need a legitimate signed request that includes the vulnerable path parameters; no local code execution is required. The flaw is therefore constrained to users who have delegated signing rights, but once an attacker gains that capability the write permission enables destructive actions.

Generated by OpenCVE AI on April 28, 2026 at 20:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace all installations of aws tough and tuftool with the vendor‑released v0.22.0 and v0.15.0 releases or later.
  • After patching, review IAM policies to confirm that only trusted principals receive delegated signing rights.
  • Validate that all file‑path arguments provided to tough or tuftool are resolved to be within the intended directories and reject any absolute or symlinked paths.

Generated by OpenCVE AI on April 28, 2026 at 20:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon tough
Amazon tuftool
CPEs cpe:2.3:a:amazon:tough:*:*:*:*:*:rust:*:*
cpe:2.3:a:amazon:tuftool:*:*:*:*:*:rust:*:*
Vendors & Products Amazon
Amazon tough
Amazon tuftool

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Aws
Aws tough
Aws tuftool
Vendors & Products Aws
Aws tough
Aws tuftool

Fri, 24 Apr 2026 20:30:00 +0000


Fri, 24 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description Incomplete path traversal fixes in awslabs/tough before tough-v0.22.0 allow remote authenticated users with delegated signing authority to write files outside intended output directories via absolute target names in copy_target/link_target, symlinked parent directories in save_target, or symlinked metadata filenames in SignedRole::write, because write paths trust the joined destination path without post-resolution containment verification. We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
Title Multiple Path Traversal Variants in awslabs/tough
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-04-24T20:10:00.800Z

Reserved: 2026-04-24T16:15:48.228Z

Link: CVE-2026-6968

cve-icon Vulnrichment

Updated: 2026-04-24T20:09:42.942Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T20:16:29.170

Modified: 2026-05-06T15:36:48.853

Link: CVE-2026-6968

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T20:00:19Z

Weaknesses