CVE-2024-32884

MEDIUM

Crates.io Gix-transport < 0.42.0 - Command Injection

Title source: rule

Description

gitoxide is a pure Rust implementation of Git. `gix-transport` does not check the username part of a URL for text that the external `ssh` program would interpret as an option. A specially crafted clone URL can smuggle options to SSH. The possibilities are syntactically limited, but if a malicious clone URL is used by an application whose current working directory contains a malicious file, arbitrary code execution occurs. This is related to the patched vulnerability GHSA-rrjw-j4m2-mf34, but appears less severe due to a greater attack complexity. This issue has been patched in versions 0.35.0, 0.42.0 and 0.62.0.

Scores

CVSS v3 6.4
EPSS 0.0007
EPSS Percentile 20.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L

Classification

CWE
CWE-88 CWE-77
Status draft

Affected Products (3)

crates.io/gix-transport < 0.42.0crates.io
crates.io/gix < 0.62crates.io
crates.io/gitoxide < 0.35crates.io

Timeline

Published Apr 26, 2024
Tracked Since Feb 18, 2026