`std::process::Command` batch files argument escaping could be bypassed with trailing whitespace or periods
Team Summary
Official summary from Internet Bug Bounty
Full GHSA: https://github.com/rust-lang/rust/security/advisories/GHSA-2xg3-7mm6-98jj
Vulnerability Details
Technical details and impact analysis
Related CVEs
Associated Common Vulnerabilities and Exposures
Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to …
Rust is a programming language. The fix for CVE-2024-24576, where `std::process::Command` incorrectly escaped arguments when invoking batch files on Windows, was incomplete. Prior to Rust version 1.81.0, it was possible to bypass the fix when the batch file name had trailing whitespace or periods (which are ignored and stripped by …
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$505.00