CVE-2024-43402
Rust-lang
CVE-2024-43402 is a command injection vulnerability affecting Rust's std::process::Command
on Windows. This security flaw arises from an incomplete fix for CVE-2024-24576, which incorrectly escaped arguments when invoking batch files. The vulnerability can be exploited if batch file names contain trailing whitespace or periods, allowing attackers to bypass the intended security measures.
With an SVRS score of 77, this vulnerability requires attention as it approaches the critical threshold. Affected systems include those using Rust versions prior to 1.81.0 where code invokes batch scripts on Windows with untrusted arguments and trailing spaces or periods in the filename. This could enable malicious actors to execute arbitrary commands. The fix in Rust 1.81.0 mitigates this risk by applying the necessary escaping rules, ensuring better security against command injection attacks. Immediate patching to Rust 1.81.0 or later is highly recommended.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.