Miggo Logo

GHSA-4fg7-vxc8-qx5w: rage vulnerable to malicious plugin names, recipients, or identities causing arbitrary binary execution

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
12/18/2024
Updated
1/3/2025
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
ragerust= 0.6.00.6.1
agerust= 0.6.00.6.1
agerust>= 0.7.0, < 0.7.20.7.2
agerust>= 0.8.0, < 0.8.20.8.2
agerust>= 0.9.0, < 0.9.30.9.3
agerust= 0.10.00.10.1
agerust= 0.11.00.11.1
ragerust>= 0.7.0, < 0.7.20.7.2
ragerust>= 0.8.0, < 0.8.20.8.2
ragerust>= 0.9.0, < 0.9.30.9.3
ragerust= 0.10.00.10.1
ragerust= 0.11.00.11.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient validation of plugin names in multiple API entry points. The commit diff shows added validation logic in age/src/plugin.rs for these specific functions, confirming they previously lacked proper sanitization. Advisory documents explicitly list these functions as attack vectors when processing attacker-controlled inputs. The functions construct plugin binaries using untrusted names without restricting special characters, enabling path traversal attacks on UNIX systems when combined with age-plugin-* directories.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* plu*in n*m* *ont*inin* * p*t* s*p*r*tor m*y *llow *n *tt**k*r to *x**ut* *n *r*itr*ry *in*ry. Su** * plu*in n*m* **n ** provi*** to t** `r***` *LI t*rou** *n *tt**k*r-*ontroll** r**ipi*nt or i**ntity strin*, or to t** *ollowin* `***` *PIs w**n t**

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt `v*li**tion` o* plu*in n*m*s in multipl* *PI *ntry points. T** *ommit *i** s*ows ***** `v*li**tion` lo*i* in `***/sr*/plu*in.rs` *or t**s* sp**i*i* `*un*tions`, *on*irmin* t**y pr*viously l**k** prop*r s*niti