Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. gix-transport
  4. ›
  5. GHSA-rrjw-j4m2-mf34

GHSA-rrjw-j4m2-mf34: gix-transport code execution vulnerability

September 25, 2023 (updated July 8, 2024)

The gix-transport crate prior to the patched version 0.36.1 would allow attackers to use malicious ssh clone URLs to pass arbitrary arguments to the ssh program, leading to arbitrary code execution.

PoC: gix clone 'ssh://-oProxyCommand=open$IFS-aCalculator/foo'

This will launch a calculator on OSX.

See https://secure.phabricator.com/T12961 for more details on similar vulnerabilities in git.

Thanks for vin01 for disclosing this issue.

References

  • github.com/Byron/gitoxide
  • github.com/Byron/gitoxide/pull/1032
  • github.com/advisories/GHSA-rrjw-j4m2-mf34
  • rustsec.org/advisories/RUSTSEC-2023-0064.html
  • secure.phabricator.com/T12961

Code Behaviors & Features

Detect and mitigate GHSA-rrjw-j4m2-mf34 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.36.1

Fixed versions

  • 0.36.1

Solution

Upgrade to version 0.36.1 or above.

Weakness

  • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

Source file

cargo/gix-transport/GHSA-rrjw-j4m2-mf34.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:23 +0000.