ghsa-r7qv-8r2h-pg27
Vulnerability from github
Issue 1: Failure to quote characters
Affected versions of this crate allowed the bytes {
and \xa0
to appear unquoted and unescaped in command arguments.
If the output of quote
or join
is passed to a shell, then what should be a single command argument could be interpreted as multiple arguments.
This does not directly allow arbitrary command execution (you can't inject a command substitution or similar). But depending on the command you're running, being able to inject multiple arguments where only one is expected could lead to undesired consequences, potentially including arbitrary command execution.
The flaw was corrected in version 1.2.1 by escaping additional characters. Updating to 1.3.0 is recommended, but 1.2.1 offers a more minimal fix if desired.
Workaround: Check for the bytes {
and \xa0
in quote
/join
input or output.
(Note: {
is problematic because it is used for glob expansion. \xa0
is problematic because it's treated as a word separator in specific environments.)
Issue 2: Dangerous API w.r.t. nul bytes
Version 1.3.0 deprecates the quote
and join
APIs in favor of try_quote
and try_join
, which behave the same except that they have Result
return type, returning Err
if the input contains nul bytes.
Strings containing nul bytes generally cannot be used in Unix command arguments or environment variables, and most shells cannot handle nul bytes even internally. If you try to pass one anyway, then the results might be security-sensitive in uncommon scenarios. More details here.
Due to the low severity, the behavior of the original quote
and join
APIs has not changed; they continue to allow nuls.
Workaround: Manually check for nul bytes in quote
/join
input or output.
Issue 3: Lack of documentation for interactive shell risks
The quote
family of functions does not and cannot escape control characters. With non-interactive shells this is perfectly safe, as control characters have no special effect. But if you writing directly to the standard input of an interactive shell (or through a pty), then control characters can cause misbehavior including arbitrary command injection.
This is essentially unfixable, and has not been patched. But as of version 1.3.0, documentation has been added.
Future versions of shlex
may add API variants that avoid the issue at the cost of reduced portability.
{ "affected": [ { "package": { "ecosystem": "crates.io", "name": "shlex" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.3.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-58266" ], "database_specific": { "cwe_ids": [], "github_reviewed": true, "github_reviewed_at": "2024-01-22T21:21:30Z", "nvd_published_at": null, "severity": "LOW" }, "details": "## Issue 1: Failure to quote characters\n\nAffected versions of this crate allowed the bytes `{` and `\\xa0` to appear unquoted and unescaped in command arguments.\n\nIf the output of `quote` or `join` is passed to a shell, then what should be a single command argument could be interpreted as multiple arguments.\n\nThis does not *directly* allow arbitrary command execution (you can\u0027t inject a command substitution or similar). But depending on the command you\u0027re running, being able to inject multiple arguments where only one is expected could lead to undesired consequences, potentially including arbitrary command execution.\n\nThe flaw was corrected in version 1.2.1 by escaping additional characters. Updating to 1.3.0 is recommended, but 1.2.1 offers a more minimal fix if desired.\n\nWorkaround: Check for the bytes `{` and `\\xa0` in `quote`/`join` input or output.\n\n(Note: `{` is problematic because it is used for glob expansion. `\\xa0` is problematic because it\u0027s treated as a word separator in [specific environments][solved-xa0].)\n\n## Issue 2: Dangerous API w.r.t. nul bytes\n\nVersion 1.3.0 deprecates the `quote` and `join` APIs in favor of `try_quote` and `try_join`, which behave the same except that they have `Result` return type, returning `Err` if the input contains nul bytes.\n\nStrings containing nul bytes generally cannot be used in Unix command arguments or environment variables, and most shells cannot handle nul bytes even internally. If you try to pass one anyway, then the results might be security-sensitive in uncommon scenarios. [More details here.][nul-bytes]\n\nDue to the low severity, the behavior of the original `quote` and `join` APIs has not changed; they continue to allow nuls.\n\nWorkaround: Manually check for nul bytes in `quote`/`join` input or output.\n\n## Issue 3: Lack of documentation for interactive shell risks\n\nThe `quote` family of functions does not and cannot escape control characters. With non-interactive shells this is perfectly safe, as control characters have no special effect. But if you writing directly to the standard input of an interactive shell (or through a pty), then control characters [can cause misbehavior including arbitrary command injection.][control-characters]\n\nThis is essentially unfixable, and has not been patched. But as of version 1.3.0, documentation has been added.\n\nFuture versions of `shlex` may add API variants that avoid the issue at the cost of reduced portability.\n\n[solved-xa0]: https://docs.rs/shlex/latest/shlex/quoting_warning/index.html#solved-xa0\n[nul-bytes]: https://docs.rs/shlex/latest/shlex/quoting_warning/index.html#nul-bytes\n[control-characters]: https://docs.rs/shlex/latest/shlex/quoting_warning/index.html#control-characters-interactive-contexts-only", "id": "GHSA-r7qv-8r2h-pg27", "modified": "2025-07-28T15:58:54Z", "published": "2024-01-22T21:21:30Z", "references": [ { "type": "WEB", "url": "https://github.com/comex/rust-shlex/security/advisories/GHSA-r7qv-8r2h-pg27" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-58266" }, { "type": "PACKAGE", "url": "https://github.com/comex/rust-shlex" }, { "type": "WEB", "url": "https://rustsec.org/advisories/RUSTSEC-2024-0006.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "type": "CVSS_V3" } ], "summary": "Multiple issues involving quote API in shlex" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.