Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-59769 | The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit. |
Github GHSA |
GHSA-rrjw-j4m2-mf34 | gix-transport code execution vulnerability |
Tue, 29 Jul 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | gix-transport: gix Command Execution Vulnerability | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 29 Jul 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gitoxidelabs
Gitoxidelabs gix-transport |
|
| Vendors & Products |
Gitoxidelabs
Gitoxidelabs gix-transport |
Mon, 28 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 28 Jul 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-07-28T17:24:12.615Z
Reserved: 2025-07-28T00:00:00.000Z
Link: CVE-2023-53158
Updated: 2025-07-28T17:24:08.784Z
Status : Deferred
Published: 2025-07-28T01:15:24.837
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-53158
OpenCVE Enrichment
Updated: 2025-07-29T10:01:03Z
EUVD
Github GHSA