目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2024-24576 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Rusts's `std::process::Command` did not properly escape arguments of batch files on Windows
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected. The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument. On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted. One exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution. Due to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the `Command` API to return an `InvalidInput` error when it cannot safely escape an argument. This error will be emitted when spawning the process. The fix is included in Rust 1.77.2. Note that the new escaping logic for batch files errs on the conservative side, and could reject valid arguments. Those who implement the escaping themselves or only handle trusted inputs on Windows can also use the `CommandExt::raw_arg` method to bypass the standard library's escaping logic.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Rust 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Rust是美国Mozilla基金会的一款通用、编译型编程语言。 Rust 1.77.2之前版本存在安全漏洞,该漏洞源于没有正确转义Windows上批处理文件的参数,攻击者可以通过绕过转义来执行任意shell命令。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
rust-langrust < 1.77.2 -
二、漏洞 CVE-2024-24576 的公开POC
#POC 描述源链接神龙链接
1Example of CVE-2024-24576 use case.https://github.com/frostb1ten/CVE-2024-24576-PoCPOC详情
2Nonehttps://github.com/brains93/CVE-2024-24576-PoC-PythonPOC详情
3CVE-2024-24576 Proof of Concepthttps://github.com/aydinnyunus/CVE-2024-24576-ExploitPOC详情
4CVE-2024-24576 PoC for Nim Langhttps://github.com/foxoman/CVE-2024-24576-PoC---NimPOC详情
5This is a simple demo for the BadBatBut vulnerability CVE-2024-24576https://github.com/corysabol/batbadbut-demoPOC详情
6https://nvd.nist.gov/vuln/detail/CVE-2024-24576https://github.com/mishalhossin/CVE-2024-24576-PoC-PythonPOC详情
7CVE-2024-24576 PoC in Juliahttps://github.com/lpn/CVE-2024-24576.jlPOC详情
8Nonehttps://github.com/Gaurav1020/CVE-2024-24576-PoC-RustPOC详情
9PoC for CVE-2024-24576 vulnerability "BatBadBut"https://github.com/SheL3G/CVE-2024-24576-PoC-BatBadButPOC详情
10a python proof of concept for cve-2024-24576https://github.com/p14t1num/cve-2024-24576-pythonPOC详情
11https://nvd.nist.gov/vuln/detail/CVE-2024-24576https://github.com/mishl-dev/CVE-2024-24576-PoC-PythonPOC详情
12Example of CVE-2024-24576 use case.https://github.com/nasa-frostb1te/CVE-2024-24576-PoCPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2024-24576 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-24576

暂无评论


发表评论