We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aws
Aws tough Aws tuftool |
|
| Vendors & Products |
Aws
Aws tough Aws tuftool |
Fri, 24 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 24 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incomplete path traversal fixes in awslabs/tough before tough-v0.22.0 allow remote authenticated users with delegated signing authority to write files outside intended output directories via absolute target names in copy_target/link_target, symlinked parent directories in save_target, or symlinked metadata filenames in SignedRole::write, because write paths trust the joined destination path without post-resolution containment verification. We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0. | |
| Title | Multiple Path Traversal Variants in awslabs/tough | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-04-24T20:10:00.800Z
Reserved: 2026-04-24T16:15:48.228Z
Link: CVE-2026-6968
Updated: 2026-04-24T20:09:42.942Z
Status : Awaiting Analysis
Published: 2026-04-24T20:16:29.170
Modified: 2026-04-27T18:57:20.293
Link: CVE-2026-6968
No data.
OpenCVE Enrichment
Updated: 2026-04-28T09:17:48Z