ID:9721 - Exploit for OS Command Injection in Rust Programming Language - CVE-2024-24576

 
Main Vulnerability Database Exploits ID:9721 - Exploit for OS Command Injection in Rust Programming Language - CVE-2024-24576

ID:9721 - Exploit for OS Command Injection in Rust Programming Language - CVE-2024-24576

Published: April 19, 2024


Vulnerability identifier: #VU88366
Vulnerability risk: High
CVE-ID: CVE-2024-24576
CWE-ID: CWE-78
Exploitation vector: Remote access
Vulnerable software:
Rust Programming Language

Link to public exploit:


Vulnerability description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper validation of arguments passed to the std::process::Command when invoking batch files (with the bat and cmd extensions) on Windows using the Command API. A remote attacker can trick the victim to run a specially crafted file and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.