CVE-2024-32884
MEDIUMCrates.io Gix-transport < 0.42.0 - Command Injection
Title source: ruleDescription
gitoxide is a pure Rust implementation of Git. `gix-transport` does not check the username part of a URL for text that the external `ssh` program would interpret as an option. A specially crafted clone URL can smuggle options to SSH. The possibilities are syntactically limited, but if a malicious clone URL is used by an application whose current working directory contains a malicious file, arbitrary code execution occurs. This is related to the patched vulnerability GHSA-rrjw-j4m2-mf34, but appears less severe due to a greater attack complexity. This issue has been patched in versions 0.35.0, 0.42.0 and 0.62.0.
Scores
CVSS v3
6.4
EPSS
0.0007
EPSS Percentile
20.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L
Classification
CWE
CWE-88
CWE-77
Status
draft
Affected Products (3)
crates.io/gix-transport
< 0.42.0crates.io
crates.io/gix
< 0.62crates.io
crates.io/gitoxide
< 0.35crates.io
Timeline
Published
Apr 26, 2024
Tracked Since
Feb 18, 2026