Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/11/05/6 | |
http://www.openwall.com/lists/oss-security/2023/11/06/5 | |
https://github.com/rust-lang/cargo/security/advisories/GHSA-r5w3-xm58-jv6j | Mitigation Third Party Advisory |
https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176 | Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/11/05/6 | |
http://www.openwall.com/lists/oss-security/2023/11/06/5 | |
https://github.com/rust-lang/cargo/security/advisories/GHSA-r5w3-xm58-jv6j | Mitigation Third Party Advisory |
https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 07:30
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
Summary |
|
|
References | () http://www.openwall.com/lists/oss-security/2023/11/05/6 - | |
References | () http://www.openwall.com/lists/oss-security/2023/11/06/5 - | |
References | () https://github.com/rust-lang/cargo/security/advisories/GHSA-r5w3-xm58-jv6j - Mitigation, Third Party Advisory | |
References | () https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176 - Patch, Third Party Advisory |
07 Nov 2023, 03:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Nov 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible. |
Information
Published : 2023-01-11 21:15
Updated : 2024-11-21 07:30
NVD link : CVE-2022-46176
Mitre link : CVE-2022-46176
CVE.ORG link : CVE-2022-46176
JSON object : View
Products Affected
rust-lang
- cargo
CWE
CWE-347
Improper Verification of Cryptographic Signature