
Cloud Vulnerability DB
A community-led vulnerabilities database
RUSTSEC-2023-0023 is a security vulnerability in the rust-openssl crate that affects the SubjectAlternativeName and ExtendedKeyUsage::other functionality, allowing arbitrary file read. The vulnerability was discovered and fixed in March 2023 as part of a series of security fixes in the rust-openssl library (GitHub PR).
The vulnerability was related to an injection vulnerability in the SubjectAlternativeName (SAN) creation and Extended Key Usage (EKU) creation processes in the rust-openssl library. The issue was addressed through code modifications that improved the handling of these certificate extensions (GitHub PR).
The vulnerability could potentially allow attackers to perform arbitrary file reads through the manipulation of SubjectAlternativeName and ExtendedKeyUsage::other parameters in certificate operations (GitHub PR).
The vulnerability was fixed in rust-openssl through a series of commits that resolved the injection vulnerabilities in SAN and EKU creation. Users should upgrade to the patched version of the library to mitigate this security risk (GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."