The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. This attack appear to be exploitable via using the --plugin flag without the --plugin-path flag. This vulnerability appears to have been fixed in 1.27.1.
References
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00076.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00006.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00031.html - | |
References | () https://groups.google.com/forum/#%21topic/rustlang-security-announcements/4ybxYLTtXuM - | |
References | () https://security.gentoo.org/glsa/201812-11 - Third Party Advisory |
07 Nov 2023, 02:51
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-07-09 20:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000622
Mitre link : CVE-2018-1000622
CVE.ORG link : CVE-2018-1000622
JSON object : View
Products Affected
rust-lang
- rust
CWE
CWE-427
Uncontrolled Search Path Element