CVE-2024-9145 Vulnerability Details

  /     /     /  

CVE-2024-9145 Metadata Quick Info

CVE Published: 01/10/2024 | CVE Updated: 21/11/2024 | CVE Year: 2024
Source: Wiz | Vendor: Wiz | Product: Wiz Code Visual Studio Code extension
Status : PUBLISHED

CVE-2024-9145 Description

Wiz Code Visual Studio Code extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio Code extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Dockerfile located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-77
CWE Name: CWE-77 Improper Neutralization of Special Elements used in a Command ( Command Injection )
Source: Wiz

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-248
CAPEC Description: CAPEC-248 Command Injection


Source: NVD (National Vulnerability Database).