Vulnerability DatabaseGHSA-rrjw-j4m2-mf34

GHSA-rrjw-j4m2-mf34
Rust vulnerability analysis and mitigation

Overview

The gix-transport crate, a component of the gitoxide project (a Git implementation in Rust), contains a vulnerability where it does not check the username part of a URL for text that the external ssh program would interpret as an option. A specially crafted clone URL can smuggle options to SSH, potentially leading to arbitrary code execution if a malicious clone URL is used by an application whose current working directory contains a malicious file. This vulnerability was discovered and patched in versions 0.35.0, 0.42.0, and 0.62.0 (GitHub Advisory).

Technical details

The vulnerability is related to how SSH URLs are processed. When an address is a URL of the form ssh://username@hostname/path, or takes the special form username@hostname:dirs/repo, the username portion is not properly sanitized before being passed to the external SSH command. If the username begins with a hyphen, SSH treats that argument as an option argument and attempts to interpret it as a sequence of options. While characters like =, /, and \ are URL-encoded, an attacker can still craft malicious usernames that SSH will interpret as command options (GitHub Advisory, RustSec Advisory).

Impact

The vulnerability allows attackers to execute arbitrary code through SSH command options if they can control the clone URL and the target system's current working directory contains a malicious file. The attack complexity is considered greater than similar vulnerabilities due to the constraints on forming valid SSH option arguments and the difficulty in completing connections without triggering errors (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in versions 0.35.0, 0.42.0, and 0.62.0. Users are advised to upgrade to one of these patched versions. The fix involves proper validation of the username portion of SSH URLs to prevent command injection through SSH options (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65807HIGH8.4
  • RustRust
  • rust-sd
NoNoDec 10, 2025
CVE-2025-66627HIGH7.8
  • RustRust
  • wasmi
NoYesDec 09, 2025
CVE-2025-67487MEDIUM5.5
  • RustRust
  • static-web-server
NoYesDec 09, 2025
CVE-2025-66622LOW1.3
  • RustRust
  • matrix-sdk-base
NoYesDec 09, 2025
RUSTSEC-2025-0135N/AN/A
  • RustRust
  • matrix-sdk-base
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management