CVE-2024-43402: What You Need to Know
hackernoon.comOn April 9th, 2024, the Rust Security Response WG disclosed CVE-2024-24576, where std::process::Command incorrectly escaped arguments when invoking batch files on Windows.

On April 9th, 2024, the Rust Security Response WG disclosed CVE-2024-24576, where std::process::Command
incorrectly escaped arguments when invoking batch files on Windows. We were notified that our fix for the vulnerability was incomplete, and it was possible to bypass the fix when the batch file name had trailing whitespace or periods (which are ignored and stripped by Windows).
The severity of the incomplete fix is low, due to the niche conditions needed to trigger it. Note that calculating the CVSS score might assign a higher severity to this, but that doesn't take into account what is required to trigger the incomplete fix.
The incomplete fix is identified by CVE-2024-43402.
Overview
Refer to the advisory for CVE-2024-24576 ...
Copyright of this story solely belongs to hackernoon.com . To see the full text click HERE