rustsec-2023-0064
Vulnerability from osv_rustsec
Published
2023-09-23 12:00
Modified
2025-10-28 06:02
Summary
gix-transport code execution vulnerability
Details
The gix-transport crate prior to the patched version 0.36.1 would allow attackers to
use malicious ssh clone URLs to pass arbitrary arguments to the ssh program, leading
to arbitrary code execution.
PoC: gix clone 'ssh://-oProxyCommand=open$IFS-aCalculator/foo'
This will launch a calculator on OSX.
See https://secure.phabricator.com/T12961 for more details on similar vulnerabilities in git.
Thanks to vin01 for disclosing the issue.
{
"affected": [
{
"database_specific": {
"categories": [
"code-execution"
],
"cvss": null,
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "gix-transport",
"purl": "pkg:cargo/gix-transport"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.0-0"
},
{
"fixed": "0.36.1"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2023-53158",
"GHSA-rrjw-j4m2-mf34"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "The `gix-transport` crate prior to the patched version 0.36.1 would allow attackers to\nuse malicious ssh clone URLs to pass arbitrary arguments to the `ssh` program, leading\nto arbitrary code execution.\n\nPoC: `gix clone \u0027ssh://-oProxyCommand=open$IFS-aCalculator/foo\u0027`\n\nThis will launch a calculator on OSX.\n\nSee \u003chttps://secure.phabricator.com/T12961\u003e for more details on similar vulnerabilities in `git`.\n\nThanks to [vin01](https://github.com/vin01) for disclosing the issue.",
"id": "RUSTSEC-2023-0064",
"modified": "2025-10-28T06:02:18Z",
"published": "2023-09-23T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/gix-transport"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2023-0064.html"
},
{
"type": "WEB",
"url": "https://github.com/Byron/gitoxide/pull/1032"
},
{
"type": "WEB",
"url": "https://secure.phabricator.com/T12961"
}
],
"related": [],
"severity": [],
"summary": "gix-transport code execution vulnerability"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…