This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate castle-game

Dependencies

(10 total, 8 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 blit^0.50.8.5out of date
 cgmath^0.170.18.0out of date
 collision^0.200.20.1up to date
 direct-gui^0.10.1.26up to date
 line_drawing^0.71.0.0out of date
 minifb^0.120.25.0out of date
 rand^0.70.8.5out of date
 rust-embed ⚠️^5.18.3.0out of date
 specs^0.100.20.0out of date
 specs-derive^0.10.4.1out of date

Security Vulnerabilities

rust-embed: RustEmbed generated `get` method allows for directory traversal when reading files from disk

RUSTSEC-2021-0126

When running in debug mode and the debug-embed (off by default) feature is not enabled, the generated get method does not check that the input path is a child of the folder given.

This allows attackers to read arbitrary files in the file system if they have control over the filename given. The following code will print the contents of your /etc/passwd if adjusted with a correct number of ../s depending on where it is run from.

#[derive(rust_embed::RustEmbed)]
#[folder = "src/"]
pub struct Asset;

fn main() {
    let d = Asset::get("../../../etc/passwd").unwrap().data;
    println!("{}", String::from_utf8_lossy(&d));
}

The flaw was corrected by canonicalizing the input filename and ensuring that it starts with the canonicalized folder path.