CVE-2024-45405
Rust vulnerability analysis and mitigation

Overview

CVE-2024-45405 affects the gix-path crate of the gitoxide project (a Rust implementation of git) prior to version 0.10.11. The vulnerability involves improper path resolution when handling configuration files associated with git installations, particularly those containing unusual or non-ASCII characters. The issue was discovered and disclosed on September 6, 2024, affecting the path handling functionality in the gix_path::env component (GitHub Advisory).

Technical details

The vulnerability occurs in the gixpath::env implementation of the installationconfig and installationconfigprefix functions. These functions call 'git config -l --show-origin' to locate git installation configuration files but fail to use the -z/--null option for literal path reporting. Instead, they attempt to parse quoted paths by simply stripping quotation marks, which can lead to incorrect path resolution when paths contain special characters. The issue has a CVSS v3.1 score of 6.0 (Medium) with vector CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N (GitHub Advisory).

Impact

When exploited, this vulnerability could enable a local attacker to inject malicious configuration leading to code execution. The impact is particularly significant in multi-user systems where users install git in predictable locations, or when paths contain non-ASCII characters. The vulnerability can result in the wrong configuration file being accessed, potentially leading to privilege escalation or unauthorized code execution (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in gix-path version 0.10.11. The fix involves adding the -z/--null and --name-only options to the git command invocation, ensuring literal path reporting and more reliable parsing. Users should upgrade to version 0.10.11 or later to address this vulnerability (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-2fjw-whxm-9v4qCRITICAL9.3
  • RustRust
  • nftnl
NoYesNov 25, 2025
CVE-2025-66017HIGH8.2
  • RustRust
  • cggmp21
NoYesNov 25, 2025
GHSA-mj73-j457-8x9qLOW2.7
  • RustRust
  • maxminddb
NoYesDec 02, 2025
GHSA-pq5v-rwp8-p7gmLOW2.7
  • RustRust
  • rtvm-interpreter
NoNoDec 02, 2025
RUSTSEC-2025-0132N/AN/A
  • RustRust
  • maxminddb
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management