cve/2024/CVE-2024-32884.md
2024-06-18 02:51:15 +02:00

20 lines
1.5 KiB
Markdown

### [CVE-2024-32884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32884)
![](https://img.shields.io/static/v1?label=Product&message=gitoxide&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.42.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20('Command%20Injection')&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20('Argument%20Injection')&color=brighgreen)
### Description
gitoxide is a pure Rust implementation of Git. `gix-transport` does not check the username part of a URL for text that the external `ssh` program would interpret as an option. A specially crafted clone URL can smuggle options to SSH. The possibilities are syntactically limited, but if a malicious clone URL is used by an application whose current working directory contains a malicious file, arbitrary code execution occurs. This is related to the patched vulnerability GHSA-rrjw-j4m2-mf34, but appears less severe due to a greater attack complexity. This issue has been patched in versions 0.35.0, 0.42.0 and 0.62.0.
### POC
#### Reference
- https://github.com/Byron/gitoxide/security/advisories/GHSA-98p4-xjmm-8mfh
- https://rustsec.org/advisories/RUSTSEC-2024-0335.html
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds