Логотип exploitDog
bind:CVE-2022-46176
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-46176

Количество 10

Количество 10

ubuntu логотип

CVE-2022-46176

почти 3 года назад

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2022-46176

почти 3 года назад

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2022-46176

почти 3 года назад

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2022-46176

почти 3 года назад

Cargo did not verify SSH host keys

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2022-46176

почти 3 года назад

Cargo is a Rust package manager. The Rust Security Response WG was not ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0133-1

почти 3 года назад

Security update for rust1.65

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0132-1

почти 3 года назад

Security update for rust1.66

EPSS: Низкий
github логотип

GHSA-r5w3-xm58-jv6j

почти 3 года назад

Cargo did not verify SSH host keys

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2023-00687

почти 3 года назад

Уязвимость менеджера пакетов Cargo языка программирования Rust, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20240402-20

больше 1 года назад

Уязвимость cargo

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-46176

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2022-46176

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-46176

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
msrc логотип
CVE-2022-46176

Cargo did not verify SSH host keys

CVSS3: 5.9
0%
Низкий
почти 3 года назад
debian логотип
CVE-2022-46176

Cargo is a Rust package manager. The Rust Security Response WG was not ...

CVSS3: 5.3
0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0133-1

Security update for rust1.65

0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0132-1

Security update for rust1.66

0%
Низкий
почти 3 года назад
github логотип
GHSA-r5w3-xm58-jv6j

Cargo did not verify SSH host keys

CVSS3: 5.3
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-00687

Уязвимость менеджера пакетов Cargo языка программирования Rust, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.3
0%
Низкий
почти 3 года назад
redos логотип
ROS-20240402-20

Уязвимость cargo

CVSS3: 5.3
0%
Низкий
больше 1 года назад

Уязвимостей на страницу