Uncontrolled Search Path Element Affecting gix-path package, versions >=0.10.8 <0.10.9


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-GIXPATH-7547193
  • published22 Jul 2024
  • disclosed18 Jul 2024
  • creditEliah Kagan

Introduced: 18 Jul 2024

CVE-2024-40644  (opens in a new tab)
CWE-427  (opens in a new tab)

How to fix?

Upgrade gix-path to version 0.10.9 or higher.

Overview

gix-path is a gitoxide project crate dealing paths and their conversions

Affected versions of this package are vulnerable to Uncontrolled Search Path Element via the env::executable_invocation() function, which searches for git.exe at the hardcoded locations C:/Program Files/Git/mingw64/bin and C:/Program Files (x86)/Git/mingw32/bin after traversing the PATH. A low-privileged user on the same system who can plant a malicious file by that name in one of the affected directories can cause it to be executed. An example scenario in which this is possible is on a 32-bit system which doesn't already have a system-owned C:\Program Files (x86) directory and git does not appear in PATH.

Note: Only Windows applications are vulnerable.

References

CVSS Scores

version 4.0
version 3.1