CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-43402

Critical Severity
Rust-lang
SVRS
77/100

CVSSv3
8.8/10

EPSS
0.00219/1

CVE-2024-43402 is a command injection vulnerability affecting Rust's std::process::Command on Windows. This security flaw arises from an incomplete fix for CVE-2024-24576, which incorrectly escaped arguments when invoking batch files. The vulnerability can be exploited if batch file names contain trailing whitespace or periods, allowing attackers to bypass the intended security measures.

With an SVRS score of 77, this vulnerability requires attention as it approaches the critical threshold. Affected systems include those using Rust versions prior to 1.81.0 where code invokes batch scripts on Windows with untrusted arguments and trailing spaces or periods in the filename. This could enable malicious actors to execute arbitrary commands. The fix in Rust 1.81.0 mitigates this risk by applying the necessary escaping rules, ensuring better security against command injection attacks. Immediate patching to Rust 1.81.0 or later is highly recommended.

In The Wild
CVSS:3.1
AV:L
AC:L
PR:L
UI:N
S:C
C:H
I:H
A:H
2024-09-04

2024-10-01

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-43402 | Rust up to 1.80.x File Extension std::process::Command os command injection
vuldb.com2024-10-01
CVE-2024-43402 | Rust up to 1.80.x File Extension std::process::Command os command injection | A vulnerability, which was classified as critical, has been found in Rust up to 1.80.x. This issue affects the function std::process::Command of the component File Extension Handler. The manipulation leads to os command injection. The identification of this vulnerability is CVE-2024
cve-2024-43402
domains
urls
cves

Social Media

Le drame du moment ! #Linux #Rust https://t.co/rbqG4wvfWK Le langage C/ C++ gère mal la mémoire , il y a donc des vulnérabilités. Rust est-il plus robuste réponse non c.f le CVE-2024-43402.
0
0
0
Rust: Security advisory for the standard library (CVE-2024-43402) https://t.co/YZKPNke1iM #RustLang #Security #DevelopmentSecurity #AppSecurity #devtalk
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppRust-langrust

References

ReferenceLink
[email protected]https://blog.rust-lang.org/2024/04/09/cve-2024-24576.html
[email protected]https://github.com/rust-lang/rust/security/advisories/GHSA-2xg3-7mm6-98jj
[email protected]https://learn.microsoft.com/en-us/troubleshoot/windows-client/shell-experience/file-folder-name-whitespace-characters

CWE Details

CWE IDCWE NameDescription
CWE-88Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')The software constructs a string for a command to executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
CWE-78Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence