Page 4 of 16 results (0.001 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. This attack appear to be exploitable via using the --plugin flag without the --plugin-path flag. This vulnerability appears to have been fixed in 1.27.1. Rust Programming Language rustdoc desde la versión 0.8 hasta la 1.27.0 contiene una vulnerabilidad CWE-427: elemento de búsqueda de ruta no controlada en los plugins rustdoc que puede resultar en la ejecución local de código como un usuario diferente. Este ataque parece ser explotable mediante el uso del flag --plugin sin el flag --plugin-path. • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00076.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00031.html https://groups.google.com/forum/#%21topic/rustlang-security-announcements/4ybxYLTtXuM https://security.gentoo.org/glsa/201812-11 • CWE-427: Uncontrolled Search Path Element •