RUSTSEC-2023-0064

Source
https://rustsec.org/advisories/RUSTSEC-2023-0064
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2023-0064.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2023-0064
Aliases
Published
2023-09-23T12:00:00Z
Modified
2024-09-03T22:37:57Z
Summary
gix-transport code execution vulnerability
Details

The gix-transport crate prior to the patched version 0.36.1 would allow attackers to use malicious ssh clone URLs to pass arbitrary arguments to the ssh program, leading to arbitrary code execution.

PoC: gix clone 'ssh://-oProxyCommand=open$IFS-aCalculator/foo'

This will launch a calculator on OSX.

See https://secure.phabricator.com/T12961 for more details on similar vulnerabilities in git.

Thanks to vin01 for disclosing the issue.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / gix-transport

Package

Name
gix-transport
View open source insights on deps.dev
Purl
pkg:cargo/gix-transport

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
0.36.1

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [],
        "arch": []
    }
}

Database specific

{
    "cvss": null,
    "informational": null,
    "categories": [
        "code-execution"
    ]
}