Back to list

The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-3288 — CVE-2023-53158

Date
Source
MSRC
Vendor
Microsoft
Threat
medium
CVSS
4.1

Summary

Advisory CVE-2023-53158. The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring.… Vendor: Microsoft. Source: MSRC. Threat: medium. CVSS 4.1. See the official…

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Read the official source

Related advisories