this post was submitted on 09 Apr 2024
8 points (90.0% liked)

Pulse of Truth

1850 readers
47 users here now

Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).

This community is automagically fed by an instance of Dittybopper.

founded 2 years ago
MODERATORS
 

Threat actors can exploit a security vulnerability in the Rust standard library to target Windows systems in command injection attacks. [...]

you are viewing a single comment's thread
view the rest of the comments
[–] PlexSheep 2 points 2 years ago* (last edited 2 years ago)

Yeah it seems weirdly specific. Also, if you pass user input to command args directly, you are asking for trouble.

"An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical if you are invoking batch files on Windows with untrusted arguments. No other platform or use is affected."

According to the article the following other langs are affected:

  • Erlang (documentation update)
  • Go (documentation update)
  • Haskell (patch available)
  • Java (won’t fix)
  • Node.js (patch will be available)
  • PHP (patch will be available)
  • Python (documentation update)
  • Ruby (documentation update)

Seems like most languages don't even treat this as a real security vulnerability?