The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Jul 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | gix-transport: gix Command Execution Vulnerability | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 29 Jul 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gitoxidelabs
Gitoxidelabs gix-transport |
|
| Vendors & Products |
Gitoxidelabs
Gitoxidelabs gix-transport |
Mon, 28 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 28 Jul 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-07-28T00:00:00.000Z
Updated: 2025-07-28T17:24:12.615Z
Reserved: 2025-07-28T00:00:00.000Z
Link: CVE-2023-53158
Updated: 2025-07-28T17:24:08.784Z
Status : Awaiting Analysis
Published: 2025-07-28T01:15:24.837
Modified: 2025-07-29T14:14:29.590
Link: CVE-2023-53158