CVE-2024-43402

admin 2024-09-09 03:25:14 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
CVE-2024-43402

CVE编号

CVE-2024-43402

利用情况

暂无

补丁情况

N/A

披露时间

2024-09-04
漏洞描述
Rust is a programming language. The fix for CVE-2024-24576, where `std::process::Command` incorrectly escaped arguments when invoking batch files on Windows, was incomplete. Prior to Rust version 1.81.0, it was possible to bypass the fix when the batch file name had trailing whitespace or periods (which are ignored and stripped by Windows). To determine whether to apply the `cmd.exe` escaping rules, the original fix for the vulnerability checked whether the command name ended with `.bat` or `.cmd`. At the time that seemed enough, as we refuse to invoke batch scripts with no file extension. Windows removes trailing whitespace and periods when parsing file paths. For example, `.bat. .` is interpreted by Windows as `.bat`, but the original fix didn't check for that. Affected users who are using Rust 1.77.2 or greater can remove the trailing whitespace (ASCII 0x20) and trailing periods (ASCII 0x2E) from the batch file name to bypass the incomplete fix and enable the mitigations. Users are affected if their code or one of their dependencies invoke a batch script on Windows with trailing whitespace or trailing periods in the name, and pass untrusted arguments to it. Rust 1.81.0 will update the standard library to apply the CVE-2024-24576 mitigations to all batch files invocations, regardless of the trailing chars in the file name.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://access.redhat.com/security/cve/CVE-2024-43402
https://blog.rust-lang.org/2024/04/09/cve-2024-24576.html
https://github.com/rust-lang/rust/security/advisories/GHSA-2xg3-7mm6-98jj
https://learn.microsoft.com/en-us/troubleshoot/windows-client/shell-experienc...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_11 rustc * Up to (excluding) 1.48.0+dfsg1-2
运行在以下环境
系统 debian_12 rustc * Up to (excluding) 1.63.0+dfsg1-2
CVSS3评分 8.1
  • 攻击路径 本地
  • 攻击复杂度 高
  • 权限要求 无
  • 影响范围 已更改
  • 用户交互 无
  • 可用性 高
  • 保密性 高
  • 完整性 高
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-ID 漏洞类型
CWE-78 OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
CVE-2024-43402 Ali_nvd

CVE-2024-43402

CVE-2024-43402CVE编号 CVE-2024-43402利用情况 暂无补丁情况 N/A披露时间 2024-09-04漏洞描述Rust is a
评论:0   参与:  0