The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Jul 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | gix-transport: gix Command Execution Vulnerability | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 29 Jul 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gitoxidelabs
Gitoxidelabs gix-transport |
|
Vendors & Products |
Gitoxidelabs
Gitoxidelabs gix-transport |
Mon, 28 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 28 Jul 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit. | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-07-28T00:00:00.000Z
Updated: 2025-07-28T17:24:12.615Z
Reserved: 2025-07-28T00:00:00.000Z
Link: CVE-2023-53158

Updated: 2025-07-28T17:24:08.784Z

Status : Awaiting Analysis
Published: 2025-07-28T01:15:24.837
Modified: 2025-07-29T14:14:29.590
Link: CVE-2023-53158
