CVE-2023-53158

The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit.
Configurations

No configuration.

History

29 Jul 2025, 14:14

Type Values Removed Values Added
Summary
  • (es) El paquete gix-transport para Rust, anterior a la versión 0.36.1, permite la ejecución de comandos mediante la subcadena "gix clone 'ssh://-oProxyCommand=open$IFS". NOTA: Esto se descubrió antes de CVE-2024-32884, una vulnerabilidad similar (que afecta a un campo de nombre de usuario) y que es más difícil de explotar.

28 Jul 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-28 01:15

Updated : 2025-07-29 14:14


NVD link : CVE-2023-53158

Mitre link : CVE-2023-53158

CVE.ORG link : CVE-2023-53158


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')