Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-50278 | Wiz Code Visual Studio Code extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio Code extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Dockerfile located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 01 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 01 Oct 2024 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wiz Code Visual Studio extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Docker image file located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file. | Wiz Code Visual Studio Code extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio Code extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Dockerfile located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file. |
| Title | Local command injection in Wiz Code Visual Studio extension | Local command injection in Wiz Code Visual Studio Code extension |
Tue, 01 Oct 2024 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wiz Code Visual Studio extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Docker image file located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file. | |
| Title | Local command injection in Wiz Code Visual Studio extension | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wiz
Published:
Updated: 2024-11-21T16:56:55.798Z
Reserved: 2024-09-24T09:58:45.182Z
Link: CVE-2024-9145
Updated: 2024-10-01T13:46:45.867Z
Status : Awaiting Analysis
Published: 2024-10-01T08:15:05.913
Modified: 2024-11-21T17:15:27.190
Link: CVE-2024-9145
No data.
OpenCVE Enrichment
No data.
EUVD