CVE-2024-48963

The package Snyk CLI before 1.1294.0 is vulnerable to Code Injection when scanning an untrusted PHP project. The vulnerability can be triggered if Snyk test is run inside the untrusted project due to the improper handling of the current working directory name. Snyk recommends only scanning trusted projects.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:snyk:snyk_cli:*:*:*:*:*:*:*:*

History

30 Oct 2024, 14:54

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 9.8
First Time Snyk
Snyk snyk Cli
References () https://github.com/snyk/snyk-php-plugin/releases/tag/v1.10.0 - () https://github.com/snyk/snyk-php-plugin/releases/tag/v1.10.0 - Release Notes
CPE cpe:2.3:a:snyk:snyk_cli:*:*:*:*:*:*:*:*

25 Oct 2024, 12:56

Type Values Removed Values Added
Summary
  • (es) El paquete Snyk CLI anterior a la versión 1.1294.0 es vulnerable a la inyección de código al escanear un proyecto PHP que no es de confianza. La vulnerabilidad puede activarse si la prueba Snyk se ejecuta dentro del proyecto que no es de confianza debido al manejo incorrecto del nombre del directorio de trabajo actual. Snyk recomienda escanear solo proyectos de confianza.

23 Oct 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-23 19:15

Updated : 2024-10-30 14:54


NVD link : CVE-2024-48963

Mitre link : CVE-2024-48963

CVE.ORG link : CVE-2024-48963


JSON object : View

Products Affected

snyk

  • snyk_cli
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')