Page 2 of 7 results (0.001 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

gitoxide is a pure Rust implementation of Git. During checkout, `gix-worktree-state` does not verify that paths point to locations in the working tree. A specially crafted repository can, when cloned, place new files anywhere writable by the application. This vulnerability leads to a major loss of confidentiality, integrity, and availability, but creating files outside a working tree without attempting to execute code can directly impact integrity as well. This vulnerability has been patched in version(s) 0.36.0. gitoxide es una implementación Rust pura de Git. • https://github.com/Byron/gitoxide/security/advisories/GHSA-7w47-3wg8-547c • CWE-23: Relative Path Traversal •

CVSS: 6.4EPSS: 0%CPEs: 3EXPL: 0

gitoxide is a pure Rust implementation of Git. `gix-transport` does not check the username part of a URL for text that the external `ssh` program would interpret as an option. A specially crafted clone URL can smuggle options to SSH. The possibilities are syntactically limited, but if a malicious clone URL is used by an application whose current working directory contains a malicious file, arbitrary code execution occurs. This is related to the patched vulnerability GHSA-rrjw-j4m2-mf34, but appears less severe due to a greater attack complexity. • https://github.com/Byron/gitoxide/security/advisories/GHSA-98p4-xjmm-8mfh https://rustsec.org/advisories/RUSTSEC-2024-0335.html • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •