this post was submitted on 11 Apr 2024
24 points (100.0% liked)

Cybersecurity

5764 readers
58 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
 

The vulnerability, which carries a perfect 10 base severity score, is tracked as CVE-2024-24576. It affects the Rust standard library, which was found to be improperly escaping arguments when invoking batch files on Windows using the Command API.

top 9 comments
sorted by: hot top controversial new old
[–] taladar 24 points 7 months ago (3 children)

Interesting how this has been widely reported as a Rust issue but the fact that other languages have no patches yet or do not even plan to patch it has seen little attention.

[–] CancerMancer 15 points 7 months ago (1 children)

Seems like a Windows issue, not a Rust one. Odd choice to assign it to Rust.

[–] taladar 11 points 7 months ago

Yeah, seems very much like "Rust fails to implement elaborate enough workaround for a stupid design choice in Windows".

[–] [email protected] 7 points 7 months ago

I think it's because it was first identified in Rust so news media ran with that.

[–] [email protected] 4 points 7 months ago (1 children)

I think it's partly because Rust has been promoted as inherently secure.

[–] taladar 9 points 7 months ago (1 children)

But nothing is so secure that it automatically fixes all design flaws in everything it interacts with.

[–] [email protected] 4 points 7 months ago

Absolutely. I merely suggested a contributing factor to answer why media coverage seems so focused on Rust.

[–] [email protected] 4 points 7 months ago (1 children)

This is the best summary I could come up with:


Programmers are being urged to update their Rust versions after the security experts working on the language addressed a critical vulnerability that could lead to malicious command injections on Windows machines.

It affects the Rust standard library, which was found to be improperly escaping arguments when invoking batch files on Windows using the Command API.

"An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping," said Pietro Albini of the Rust Security Response Working Group, who wrote the advisory.

The language is a fan favorite, routinely topping Stack Overflow's rankings for how enjoyable developers find Rust to use in their work, and Googlers hail its productivity benefits.

According to RyotaK, the researcher who reported the vulnerability, which they are referring to as BatBadBut due to it revolving around batch files and its severity – "bad, but not the worst" – the issue affects more technologies than Rust alone.

RyotaK also made the point that users should not jump to conclusions based on the CVSS rating alone, since the severity of the issue will depend on each application individually and should be recalculated as such.


The original article contains 552 words, the summary contains 195 words. Saved 65%. I'm a bot and I'm open source!

[–] kid 2 points 7 months ago