CVE-2024-32884 — Command Injection in Gitoxide
CWE-77 — Command InjectionCWE-88 — Argument InjectionCWE-78 — OS Command Injection11 documents5 sources
Severity
6.4MEDIUMNVD
NVD4.1OSV4.1
EPSS
0.1%
top 79.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 26
Latest updateJul 28
Description
gitoxide is a pure Rust implementation of Git. `gix-transport` does not check the username part of a URL for text that the external `ssh` program would interpret as an option. A specially crafted clone URL can smuggle options to SSH. The possibilities are syntactically limited, but if a malicious clone URL is used by an application whose current working directory contains a malicious file, arbitrary code execution occurs. This is related to the patched vulnerability GHSA-rrjw-j4m2-mf34, but appe…
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:LExploitability: 1.6 | Impact: 4.7
Affected Packages8 packages
🔴Vulnerability Details
6📋Vendor Advisories
3Microsoft▶
The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnera↗2025-07-08