Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-24576

Опубликовано: 09 апр. 2024
Источник: ubuntu
Приоритет: negligible
EPSS Высокий
CVSS3: 10

Описание

Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the bat and cmd extensions) on Windows using the Command. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected. The Command::arg and Command::args APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument. On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the argume...

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

not-affected

only affects rustc on Windows
esm-apps/focal

not-affected

only affects rustc on Windows
esm-apps/jammy

not-affected

only affects rustc on Windows
esm-apps/xenial

not-affected

only affects rustc on Windows
focal

not-affected

only affects rustc on Windows
jammy

not-affected

only affects rustc on Windows
mantic

DNE

upstream

not-affected

only affects rustc on Windows

Показывать по

РелизСтатусПримечание
devel

not-affected

only affects rustc on Windows
esm-apps/bionic

not-affected

only affects rustc on Windows
esm-apps/focal

not-affected

only affects rustc on Windows
esm-apps/xenial

not-affected

only affects rustc on Windows
esm-infra-legacy/trusty

not-affected

only affects rustc on Windows
focal

not-affected

only affects rustc on Windows
jammy

not-affected

only affects rustc on Windows
mantic

not-affected

only affects rustc on Windows
trusty/esm

not-affected

only affects rustc on Windows
upstream

not-affected

debian: Only affects rustc on Windows

Показывать по

EPSS

Процентиль: 99%
0.80474
Высокий

10 Critical

CVSS3

Связанные уязвимости

redhat
почти 2 года назад

Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected. The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument. On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the argume...

CVSS3: 10
nvd
почти 2 года назад

Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected. The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument. On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the argumen

CVSS3: 10
debian
почти 2 года назад

Rust is a programming language. The Rust Security Response WG was noti ...

CVSS3: 10
fstec
почти 2 года назад

Уязвимость реализации прикладного программного интерфейса интерпретатора языка программирования Rust для операционных систем Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 10
redos
больше 1 года назад

Уязвимость rust

EPSS

Процентиль: 99%
0.80474
Высокий

10 Critical

CVSS3