Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-16765

Опубликовано: 25 нояб. 2019
Источник: nvd
CVSS3: 7.4
CVSS3: 7.8
CVSS2: 6.8
EPSS Низкий

Описание

If an attacker can get a user to open a specially prepared directory tree as a workspace in Visual Studio Code with the CodeQL extension active, arbitrary code of the attacker's choosing may be executed on the user's behalf. This is fixed in version 1.0.1 of the extension. Users should upgrade to this version using Visual Studio Code Marketplace's upgrade mechanism. After upgrading, the codeQL.cli.executablePath setting can only be set in the per-user settings, and not in the per-workspace settings. More information about VS Code settings can be found here.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:microsoft:codeql:*:*:*:*:*:visual_studio_code:*:*
Версия до 1.0.1 (исключая)

EPSS

Процентиль: 74%
0.00841
Низкий

7.4 High

CVSS3

7.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-22
NVD-CWE-noinfo

Связанные уязвимости

github
больше 3 лет назад

If an attacker can get a user to open a specially prepared directory tree as a workspace in Visual Studio Code with the CodeQL extension active, arbitrary code of the attacker's choosing may be executed on the user's behalf. This is fixed in version 1.0.1 of the extension. Users should upgrade to this version using Visual Studio Code Marketplace's upgrade mechanism. After upgrading, the codeQL.cli.executablePath setting can only be set in the per-user settings, and not in the per-workspace settings. More information about VS Code settings can be found here.

EPSS

Процентиль: 74%
0.00841
Низкий

7.4 High

CVSS3

7.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-22
NVD-CWE-noinfo