gitoxide is a pure Rust implementation of Git. `gix-transport` does not check the username part of a URL for text that the external `ssh` program would interpret as an option. A specially crafted clone URL can smuggle options to SSH. The possibilities are syntactically limited, but if a malicious clone URL is used by an application whose current working directory contains a malicious file, arbitrary code execution occurs. This is related to the patched vulnerability GHSA-rrjw-j4m2-mf34, but appears less severe due to a greater attack complexity. This issue has been patched in versions 0.35.0, 0.42.0 and 0.62.0.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-1168 gitoxide is a pure Rust implementation of Git. `gix-transport` does not check the username part of a URL for text that the external `ssh` program would interpret as an option. A specially crafted clone URL can smuggle options to SSH. The possibilities are syntactically limited, but if a malicious clone URL is used by an application whose current working directory contains a malicious file, arbitrary code execution occurs. This is related to the patched vulnerability GHSA-rrjw-j4m2-mf34, but appears less severe due to a greater attack complexity. This issue has been patched in versions 0.35.0, 0.42.0 and 0.62.0.
Github GHSA Github GHSA GHSA-98p4-xjmm-8mfh gix-transport indirect code execution via malicious username
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T02:20:35.704Z

Reserved: 2024-04-19T14:07:11.231Z

Link: CVE-2024-32884

cve-icon Vulnrichment

Updated: 2024-05-01T17:07:27.869Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-26T18:15:46.167

Modified: 2024-11-21T09:15:56.180

Link: CVE-2024-32884

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses