HackerOne Disclosed Reports - 2025-05-24

0 Replies, 357 Views

Logo
Medium
resolved

WASI sandbox escape via symlink


Bug reported by Jesse Wilson was disclosed at May 24, 2025, 10:33 am   |   Privilege Escalation

A WASI + WASM program was discovered to be able to use `path_symlink` to read arbitrary files on the host machine by creating a symlink in a preopen to a different location on the local file system, thereby escaping the WASI sandbox.


[Image: e72398fe92beda2aa80d0329e8b9f4febece7568.gif]

Messages In This Thread
HackerOne disclosed reports - 2025-05-24 - by hashXploiter - 05-25-2025, 06:00 PM



Users browsing this thread: 1 Guest(s)