{"id":"CVE-2018-1000622","details":"The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. This attack appear to be exploitable via using the --plugin flag without the --plugin-path flag. This vulnerability appears to have been fixed in 1.27.1.","modified":"2026-04-10T04:03:27.569376Z","published":"2018-07-09T20:29:00.817Z","related":["MGASA-2018-0318","SUSE-RU-2019:0386-1","SUSE-SU-2018:3357-1","SUSE-SU-2019:2439-1","SUSE-SU-2019:2755-1","openSUSE-SU-2019:2203-1","openSUSE-SU-2019:2244-1","openSUSE-SU-2019:2294-1","openSUSE-SU-2024:11359-1","openSUSE-SU-2024:11360-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00076.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00006.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00031.html"},{"type":"WEB","url":"https://groups.google.com/forum/#%21topic/rustlang-security-announcements/4ybxYLTtXuM"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201812-11"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rust-lang/rust","events":[{"introduced":"8a4f0fa6c518eb634687abe9659601d9d2a61899"},{"last_affected":"3eda71b00ad48d7bf4eef4c443e7f611fd061418"}],"database_specific":{"versions":[{"introduced":"0.8"},{"last_affected":"1.27.0"}]}}],"versions":["0.8","0.9","1.0.0-alpha","1.0.0-alpha.2","1.0.0-beta","1.27.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1000622.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}