Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade tauri-cli
to version 2.0.0-alpha.16 or higher.
tauri-cli is a polyglot and generic system that is very composable and allows engineers to make a wide variety of applications.
Affected versions of this package are vulnerable to Insufficiently Protected Credentials via the vite.config.ts
configuration file. An attacker can access the private key and updater key password by exploiting a misconfiguration in the Vite frontend of bundled Tauri applications. This is only exploitable if the envPrefix: ['VITE_', 'TAURI_'],
snippet from the Vite guide is copied into the vite.config.ts
of a Tauri project, leading to the bundling of the TAURI_PRIVATE_KEY
and TAURI_KEY_PASSWORD
into the Vite frontend code.
Note This is an informational advisory describing a commonly used misconfiguration and not a classic case of a vulnerability in the code.
This vulnerability can be mitigated by using the envPrefix: ['VITE_'],
and manually adding the desired TAURI
variables. These variables could be added TAURI_PLATFORM
, TAURI_ARCH
, TAURI_FAMILY
, TAURI_PLATFORM_VERSION
, TAURI_PLATFORM_TYPE
and TAURI_DEBUG
without leaking sensitive information.