Critical Rust Standard Library Vulnerability - 20240416004¶
Overview¶
The Rust Security Response WG has been notified that certain version of Rust standard library did not properly escape arguments when invoking batch files (with the bat
and cmd
extensions) on Windows using the Command
. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping.
What is vulnerable?¶
CVE | Severity | CVSS | Product(s) Affected | Summary | Dated |
---|---|---|---|---|---|
CVE-2024-24576 | Critical | 10.0 | Rust standard library prior to version 1.77.2 | This vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. | 11 April, 2024 |
What has been observed?¶
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month (refer Patch Management):