CVE-2024-24576
Severity
10.0CRITICAL
EPSS
79.2%
top 0.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 9
Latest updateNov 22
Description
Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrus…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0
Affected Packages2 packages
Also affects: Fedora 38, 39, 40
🔴Vulnerability Details
1CVEList▶
Rusts's `std::process::Command` did not properly escape arguments of batch files on Windows↗2024-04-09
📋Vendor Advisories
3🕵️Threat Intelligence
1💬Community
1HackerOne▶
`std::process::Command` batch files argument escaping could be bypassed with trailing whitespace or periods↗2024-11-22