Unrated severityNVD Advisory· Published Jul 9, 2018· Updated Aug 5, 2024
CVE-2018-1000622
CVE-2018-1000622
Description
The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. This attack appear to be exploitable via using the --plugin flag without the --plugin-path flag. This vulnerability appears to have been fixed in 1.27.1.
Affected products
5- osv-coords5 versionspkg:rpm/opensuse/rust1.53&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/rust-cbindgen&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/rust&distro=openSUSE%20Leap%2015.1pkg:rpm/suse/rust&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015pkg:rpm/suse/rust&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1
< 1.53.0-2.5+ 4 more
- (no CPE)range: < 1.53.0-2.5
- (no CPE)range: < 0.8.7-lp151.2.2
- (no CPE)range: < 1.36.0-lp151.5.4.1
- (no CPE)range: < 1.31.1-3.9.2
- (no CPE)range: < 1.36.0-4.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- lists.opensuse.org/opensuse-security-announce/2019-09/msg00076.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2019-10/msg00006.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2019-10/msg00031.htmlmitrevendor-advisoryx_refsource_SUSE
- security.gentoo.org/glsa/201812-11mitrevendor-advisoryx_refsource_GENTOO
- groups.google.com/forum/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.