We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-53158



Description

The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit.

Reserved 2025-07-28 | Published 2025-07-28 | Updated 2025-07-28 | Assigner mitre


MEDIUM: 4.1CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

Any version before 0.36.1
affected

References

rustsec.org/advisories/RUSTSEC-2023-0064.html

github.com/GitoxideLabs/gitoxide/pull/1032

github.com/advisories/GHSA-rrjw-j4m2-mf34

crates.io/crates/gix-transport

cve.org (CVE-2023-53158)

nvd.nist.gov (CVE-2023-53158)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-53158

Support options

Helpdesk Chat, Email, Knowledgebase