Lucene search

K
redhatcveRedhat.comRH:CVE-2023-38497
HistoryAug 04, 2023 - 11:23 a.m.

CVE-2023-38497

2023-08-0411:23:22
redhat.com
access.redhat.com
11
rust-cargo
umask
tarballs
permissions
arbitrary code

7.9 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

0.0004 Low

EPSS

Percentile

5.1%

A flaw was found in the rust-cargo package. Cargo, as bundled with the Rust compiler, did not respect the umask when extracting dependency tarballs and caching the extraction for future builds. If a dependency contained files with 0777 permissions, another local user could edit the cache of the extracted source code, potentially executing arbitrary code with the privileges of the user running Cargo during the next build.

Mitigation

We recommend configuring your system to prevent other local users from accessing the Cargo directory, usually located in ~/.cargo.

7.9 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

0.0004 Low

EPSS

Percentile

5.1%