Skip to content

Commit 15d0b6e

Browse files
Merge pull request #4317 from github/EliahKagan-GHSA-rrjw-j4m2-mf34
2 parents 919afe6 + 6a53ce4 commit 15d0b6e

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

advisories/github-reviewed/2023/09/GHSA-rrjw-j4m2-mf34/GHSA-rrjw-j4m2-mf34.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rrjw-j4m2-mf34",
4-
"modified": "2023-09-25T20:21:16Z",
4+
"modified": "2023-09-25T20:21:17Z",
55
"published": "2023-09-25T20:21:16Z",
66
"aliases": [
77

88
],
99
"summary": "gix-transport code execution vulnerability",
10-
"details": "The `gix-transport` crate prior to the patched version 0.36.1 would allow attackers to use malicious ssh clone URLs to pass arbitrary arguments to the `ssh` program, leading to arbitrary code execution.\n\nPoC: `gix clone 'ssh://-oProxyCommand=open$IFS-aCalculator/foo'`\n\nThis will launch a calculator on OSX.\n\nSee https://secure.phabricator.com/T12961 for more details on similar vulnerabilities in `git`.",
10+
"details": "The `gix-transport` crate prior to the patched version 0.36.1 would allow attackers to use malicious ssh clone URLs to pass arbitrary arguments to the `ssh` program, leading to arbitrary code execution.\n\nPoC: `gix clone 'ssh://-oProxyCommand=open$IFS-aCalculator/foo'`\n\nThis will launch a calculator on OSX.\n\nSee https://secure.phabricator.com/T12961 for more details on similar vulnerabilities in `git`.\n\nThanks for [vin01](https://github.com/vin01) for disclosing the issue.",
1111
"severity": [
1212

1313
],
@@ -52,7 +52,7 @@
5252
],
5353
"database_specific": {
5454
"cwe_ids": [
55-
55+
"CWE-88"
5656
],
5757
"severity": "MODERATE",
5858
"github_reviewed": true,

0 commit comments

Comments
 (0)