The shlex crate before 1.2.1 for Rust allows unquoted and unescaped instances of the { and \xa0 characters, which may facilitate command injection.
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
Link | Tags |
---|---|
https://rustsec.org/advisories/RUSTSEC-2024-0006.html | third party advisory |
https://github.com/comex/rust-shlex/security/advisories/GHSA-r7qv-8r2h-pg27 | vendor advisory |
https://crates.io/crates/shlex | product |