CVE-2024-32884

MEDIUM

Crates.io Gix-transport < 0.42.0 - Command Injection

Title source: rule
STIX 2.1

Description

gitoxide is a pure Rust implementation of Git. `gix-transport` does not check the username part of a URL for text that the external `ssh` program would interpret as an option. A specially crafted clone URL can smuggle options to SSH. The possibilities are syntactically limited, but if a malicious clone URL is used by an application whose current working directory contains a malicious file, arbitrary code execution occurs. This is related to the patched vulnerability GHSA-rrjw-j4m2-mf34, but appears less severe due to a greater attack complexity. This issue has been patched in versions 0.35.0, 0.42.0 and 0.62.0.

Scores

CVSS v3 6.4
EPSS 0.0007
EPSS Percentile 20.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-77 CWE-88
Status published
Products (6)
Byron/gitoxide < 0.35
Byron/gitoxide < 0.42.0
Byron/gitoxide < 0.62
crates.io/gitoxide 0 - 0.35crates.io
crates.io/gix 0 - 0.62crates.io
crates.io/gix-transport 0 - 0.42.0crates.io
Published Apr 26, 2024
Tracked Since Feb 18, 2026