Wiz Code Visual Studio Code extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio Code extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Dockerfile located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file.
History

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 0.0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N'}


Tue, 01 Oct 2024 14:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Oct 2024 08:00:00 +0000

Type Values Removed Values Added
Description Wiz Code Visual Studio extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Docker image file located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file. Wiz Code Visual Studio Code extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio Code extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Dockerfile located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file.
Title Local command injection in Wiz Code Visual Studio extension Local command injection in Wiz Code Visual Studio Code extension

Tue, 01 Oct 2024 07:30:00 +0000

Type Values Removed Values Added
Description Wiz Code Visual Studio extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Docker image file located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file.
Title Local command injection in Wiz Code Visual Studio extension
Weaknesses CWE-77
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wiz

Published: 2024-10-01T07:23:03.891Z

Updated: 2024-11-21T16:56:55.798Z

Reserved: 2024-09-24T09:58:45.182Z

Link: CVE-2024-9145

cve-icon Vulnrichment

Updated: 2024-10-01T13:46:45.867Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-01T08:15:05.913

Modified: 2024-11-21T17:15:27.190

Link: CVE-2024-9145

cve-icon Redhat

No data.