CVE-2018-1000622

CWE-427CWE-4269 documents7 sources
Severity
7.8HIGH
EPSS
0.8%
top 25.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 9
Latest updateMay 13

Description

The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. This attack appear to be exploitable via using the --plugin flag without the --plugin-path flag. This vulnerability appears to have been fixed in 1.27.1.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debianrustc< 1.27.1+dfsg1-1~exp1+3
NVDrust-lang/rust0.81.27.0

🔴Vulnerability Details

3
GHSA
GHSA-6f94-33qx-gqcf: The Rust Programming Language rustdoc version Between 02022-05-13
OSV
CVE-2018-1000622: The Rust Programming Language rustdoc version Between 02018-07-09
CVEList
CVE-2018-1000622: The Rust Programming Language rustdoc version Between 02018-07-09

📋Vendor Advisories

2
Red Hat
rust: rustdoc loads plugins from world writable directory allowing for arbitrary code execution2018-07-08
Debian
CVE-2018-1000622: rustc - The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a ...2018

💬Community

3
Bugzilla
CVE-2018-1000622 rust: rustdoc loads plugins from world writable directory allowing for arbitrary code execution [fedora-all]2018-07-08
Bugzilla
CVE-2018-1000622 rust: rustdoc loads plugins from world writable directory allowing for arbitrary code execution [epel-7]2018-07-08
Bugzilla
CVE-2018-1000622 rust: rustdoc loads plugins from world writable directory allowing for arbitrary code execution2018-07-02