Arbitrary File Read Affecting openssl package, versions >=0.9.7 <0.10.48


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary File Read vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-OPENSSL-3373057
  • published26 Mar 2023
  • disclosed24 Mar 2023
  • creditDavid Benjamin (Google)

Introduced: 24 Mar 2023

CVE NOT AVAILABLE CWE-22  (opens in a new tab)

How to fix?

Upgrade openssl to version 0.10.48 or higher.

Overview

openssl is a bindings for the Rust programming language.

Affected versions of this package are vulnerable to Arbitrary File Read via the SubjectAlternativeName and ExtendedKeyUsage::other arguments, that are parsed using the OpenSSL function X509V3_EXT_nconf. This function parses all input using an OpenSSL mini-language which can perform arbitrary file reads.

CVSS Scores

version 3.1