Wiz Code Visual Studio Code extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio Code extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Dockerfile located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-50278 Wiz Code Visual Studio Code extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio Code extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Dockerfile located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 0.0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N'}


Tue, 01 Oct 2024 14:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Oct 2024 08:00:00 +0000

Type Values Removed Values Added
Description Wiz Code Visual Studio extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Docker image file located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file. Wiz Code Visual Studio Code extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio Code extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Dockerfile located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file.
Title Local command injection in Wiz Code Visual Studio extension Local command injection in Wiz Code Visual Studio Code extension

Tue, 01 Oct 2024 07:30:00 +0000

Type Values Removed Values Added
Description Wiz Code Visual Studio extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Docker image file located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file.
Title Local command injection in Wiz Code Visual Studio extension
Weaknesses CWE-77
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wiz

Published:

Updated: 2024-11-21T16:56:55.798Z

Reserved: 2024-09-24T09:58:45.182Z

Link: CVE-2024-9145

cve-icon Vulnrichment

Updated: 2024-10-01T13:46:45.867Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-01T08:15:05.913

Modified: 2024-11-21T17:15:27.190

Link: CVE-2024-9145

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses