gitoxide is a pure Rust implementation of Git. During checkout, `gix-worktree-state` does not verify that paths point to locations in the working tree. A specially crafted repository can, when cloned, place new files anywhere writable by the application. This vulnerability leads to a major loss of confidentiality, integrity, and availability, but creating files outside a working tree without attempting to execute code can directly impact integrity as well. This vulnerability has been patched in version(s) 0.36.0.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| gix-worktree-state(crates.io) | 0 | 0.11.0 | N/A |
| gitoxide(crates.io) | 0 | 0.36.0 | N/A |
| gix-fs(crates.io) | 0 | 0.11.0 | N/A |
| gix-worktree(crates.io) | 0 | 0.34.0 | N/A |
| gix(crates.io) | 0 | 0.63.0 | N/A |
| gitoxide-core(crates.io) | 0 | 0.38.0 | N/A |
| gix-index(crates.io) | 0 | 0.33.0 | N/A |
CVSS Metrics