First published: Mon Jul 09 2018(Updated: )
The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. This attack appear to be exploitable via using the --plugin flag without the --plugin-path flag. This vulnerability appears to have been fixed in 1.27.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rust-lang Rust | >=0.8<=1.27.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000622 is a vulnerability in the Rust Programming Language rustdoc version Between 0.8 and 1.27.0 that allows for local code execution as a different user.
CVE-2018-1000622 is considered to be a high severity vulnerability with a CVSS score of 7.8.
The affected software is Rust Programming Language rustdoc version between 0.8 and 1.27.0.
CVE-2018-1000622 can be exploited by using the --plugin flag without the --plugi…
Yes, updating to a version of Rust Programming Language rustdoc above 1.27.0 will fix the CVE-2018-1000622 vulnerability.