CVE-2018-1000622
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. This attack appear to be exploitable via using the --plugin flag without the --plugin-path flag. This vulnerability appears to have been fixed in 1.27.1.
Rust Programming Language rustdoc desde la versión 0.8 hasta la 1.27.0 contiene una vulnerabilidad CWE-427: elemento de búsqueda de ruta no controlada en los plugins rustdoc que puede resultar en la ejecución local de código como un usuario diferente. Este ataque parece ser explotable mediante el uso del flag --plugin sin el flag --plugin-path. La vulnerabilidad parece haber sido solucionada en la versión 1.27.1.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-07-06 CVE Reserved
- 2018-07-09 CVE Published
- 2024-06-18 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-427: Uncontrolled Search Path Element
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://groups.google.com/forum/#%21topic/rustlang-security-announcements/4ybxYLTtXuM | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rust-lang Search vendor "Rust-lang" | Rust Search vendor "Rust-lang" for product "Rust" | >= 0.8 <= 1.27.0 Search vendor "Rust-lang" for product "Rust" and version " >= 0.8 <= 1.27.0" | - |
Affected
|