Dark C0d3rs

Full Version: HackerOne Disclosed Reports - 2025-05-24
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Logo
Medium
resolved

WASI sandbox escape via symlink


Bug reported by Jesse Wilson was disclosed at May 24, 2025, 10:33 am   |   Privilege Escalation

A WASI + WASM program was discovered to be able to use `path_symlink` to read arbitrary files on the host machine by creating a symlink in a preopen to a different location on the local file system, thereby escaping the WASI sandbox.