Overview
- Description
- The package snyk before 1.1064.0 are vulnerable to Code Injection when analyzing a project. An attacker who can convince a user to scan a malicious project can include commands in a build file such as build.gradle or gradle-wrapper.jar, which will be executed with the privileges of the application. This vulnerability may be triggered when running the the CLI tool directly, or when running a scan with one of the IDE plugins that invoke the Snyk CLI. Successful exploitation of this issue would likely require some level of social engineering - to coerce an untrusted project to be downloaded and analyzed via the Snyk CLI or opened in an IDE where a Snyk IDE plugin is installed and enabled. Additionally, if the IDE has a Trust feature then the target folder must be marked as ‘trusted’ in order to be vulnerable. **NOTE:** This issue is independent of the one reported in [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342), and upgrading to a fixed version for this addresses that issue as well. The affected IDE plugins and versions are: - VS Code - Affected: <=1.8.0, Fixed: 1.9.0 - IntelliJ - Affected: <=2.4.47, Fixed: 2.4.48 - Visual Studio - Affected: <=1.1.30, Fixed: 1.1.31 - Eclipse - Affected: <=v20221115.132308, Fixed: All subsequent versions - Language Server - Affected: <=v20221109.114426, Fixed: All subsequent versions
- Source
- report@snyk.io
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- CWE-78
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:snyk:snyk_cli:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD69CF9C-0537-454E-B35D-51B58C154555", "versionEndExcluding": "1.1064.0" }, { "criteria": "cpe:2.3:a:snyk:snyk_language_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "391D254D-93ED-4C4C-ACB4-54FFB238B887", "versionEndIncluding": "20221109.114426" }, { "criteria": "cpe:2.3:a:snyk:snyk_security:*:*:*:*:*:visual_studio:*:*", "vulnerable": true, "matchCriteriaId": "DEC9FD7F-3939-4C21-A711-54AAB6532ED2", "versionEndIncluding": "1.1.30" }, { "criteria": "cpe:2.3:a:snyk:snyk_security:*:*:*:*:*:visual_studio_code:*:*", "vulnerable": true, "matchCriteriaId": "8EBC0CC7-1004-4B9B-8832-219A11747333", "versionEndIncluding": "1.8.0" }, { "criteria": "cpe:2.3:a:snyk:snyk_security:*:*:*:*:*:intellij:*:*", "vulnerable": true, "matchCriteriaId": "D6FD7290-6EA1-41A0-B34D-13FA4495C39A", "versionEndIncluding": "2.4.47" }, { "criteria": "cpe:2.3:a:snyk:snyk_security:*:*:*:*:*:eclipse:*:*", "vulnerable": true, "matchCriteriaId": "7F744FCA-7654-40AA-B101-61A254E11A13", "versionEndIncluding": "20221115.132308" } ], "operator": "OR" } ] } ]