Improper Neutralization of Special Elements used in a Command ('Command Injection') (CWE-77)
gitoxide is a pure Rust implementation of Git. `gix-transport` does not check the username part of a URL for text that the external `ssh` program would interpret as an option. A specially crafted clone URL can smuggle options to SSH. The possibilities are syntactically limited, but if a malicious clone URL is used by an application whose current working directory contains a malicious file, arbitrary code execution occurs. This is related to the patched vulnerability GHSA-rrjw-j4m2-mf34, but appears less severe due to a greater attack complexity. This issue has been patched in versions 0.35.0, 0.42.0 and 0.62.0.
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L
NVD published the first details for CVE-2024-32884
A CVSS base score of 6.4 has been assigned.
Feedly found the first article mentioning CVE-2024-32884. See article
EPSS Score was set to: 0.04% (Percentile: 8.2%)
CVE-2024-32884 is a critical vulnerability in Gitoxide that allows for arbitrary code execution when a specially crafted clone URL is used in an application with a malicious file in its working directory. While the attack complexity is higher than a previously patched vulnerability, it still poses a significant risk. Patches are available in versions 0.35.0, 0.42.0, and 0.62.0 to mitigate this issue. See article
Feedly estimated the CVSS score as HIGH