CVE-2024-48964

The package Snyk CLI before 1.1294.0 is vulnerable to Code Injection when scanning an untrusted Gradle project. The vulnerability can be triggered if Snyk test is run inside the untrusted project due to the improper handling of the current working directory name. Snyk recommends only scanning trusted projects.
Configurations

Configuration 1 (hide)

cpe:2.3:a:snyk:snyk_cli:*:*:*:*:*:*:*:*

History

30 Oct 2024, 13:46

Type Values Removed Values Added
First Time Snyk
Snyk snyk Cli
CPE cpe:2.3:a:snyk:snyk_cli:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 8.8
References () https://github.com/snyk/snyk-gradle-plugin/commit/2f5ee7579f00660282dd161a0b79690f4a9c865d - () https://github.com/snyk/snyk-gradle-plugin/commit/2f5ee7579f00660282dd161a0b79690f4a9c865d - Patch
CWE CWE-94

25 Oct 2024, 12:56

Type Values Removed Values Added
Summary
  • (es) El paquete Snyk CLI anterior a la versión 1.1294.0 es vulnerable a la inyección de código al escanear un proyecto Gradle que no es de confianza. La vulnerabilidad puede activarse si la prueba Snyk se ejecuta dentro del proyecto que no es de confianza debido al manejo incorrecto del nombre del directorio de trabajo actual. Snyk recomienda escanear solo proyectos de confianza.

23 Oct 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-23 19:15

Updated : 2024-10-30 13:46


NVD link : CVE-2024-48964

Mitre link : CVE-2024-48964

CVE.ORG link : CVE-2024-48964


JSON object : View

Products Affected

snyk

  • snyk_cli
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')