CVE-2023-38497
moderate-risk
Published 2023-08-04
Cargo downloads the Rust project’s dependencies and compiles the project. Cargo prior to version 0.72.2, bundled with Rust prior to version 1.71.1, did not respect the umask when extracting crate archives on UNIX-like systems. If the user downloaded a crate containing files writeable by any local user, another local user could exploit this to change the source code compiled and executed by the current user. To prevent existing cached extractions from being exploitable, the Cargo binary version 0.72.2 included in Rust 1.71.1 or later will purge caches generated by older Cargo versions automatically. As a workaround, configure one's system to prevent other local users from accessing the Cargo directory, usually located in `~/.cargo`.
Do I need to act?
~
5.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.9/10
High
LOCAL
/ LOW complexity
Affected Products (2)
Cargo
Affected Vendors
References (16)
Not Applicable
https://en.wikipedia.org/wiki/Umask
Mailing List
https://github.com/rust-lang/cargo/pull/12443
Third Party Advisory
https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-384...
Not Applicable
https://en.wikipedia.org/wiki/Umask
Mailing List
https://github.com/rust-lang/cargo/pull/12443
Third Party Advisory
https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-384...
41
/ 100
moderate-risk
Severity
25/34 · High
Exploitability
9/34 · Low
Exposure
7/34 · Low