Snyk CLI before 1.996.0 allows arbitrary command execution, affecting Snyk IDE plugins and the snyk npm package. Exploitation could follow from the common practice of viewing untrusted files in the Visual Studio Code editor, for example. The original demonstration was with shell metacharacters in the vendor.json ignore field, affecting snyk-go-plugin before 1.19.1. This affects, for example, the Snyk TeamCity plugin (which does not update automatically) before 20220930.142957.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-7108 Snyk CLI before 1.996.0 allows arbitrary command execution, affecting Snyk IDE plugins and the snyk npm package. Exploitation could follow from the common practice of viewing untrusted files in the Visual Studio Code editor, for example. The original demonstration was with shell metacharacters in the vendor.json ignore field, affecting snyk-go-plugin before 1.19.1. This affects, for example, the Snyk TeamCity plugin (which does not update automatically) before 20220930.142957.
Github GHSA Github GHSA GHSA-hpqj-7cj6-hfj8 Snyk CLI affected by Command Injection vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T12:28:42.504Z

Reserved: 2022-09-18T00:00:00

Link: CVE-2022-40764

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-10-03T15:15:18.477

Modified: 2024-11-21T07:22:00.823

Link: CVE-2022-40764

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-10-03T00:00:00Z

Links: CVE-2022-40764 - Bugzilla

cve-icon OpenCVE Enrichment

No data.