The package Snyk CLI before 1.1294.0 is vulnerable to Code Injection when scanning an untrusted PHP project. The vulnerability can be triggered if Snyk test is run inside the untrusted project due to the improper handling of the current working directory name. Snyk recommends only scanning trusted projects.
History

Wed, 30 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:snyk:snyk_cli:*:*:*:*:*:*:*:*

Thu, 24 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Snyk
Snyk snyk Cli
Snyk snyk Php Plugin
CPEs cpe:2.3:a:snyk:snyk_cli:-:*:*:*:*:*:*:*
cpe:2.3:a:snyk:snyk_php_plugin:*:*:*:*:*:*:*:*
Vendors & Products Snyk
Snyk snyk Cli
Snyk snyk Php Plugin
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 23 Oct 2024 18:45:00 +0000

Type Values Removed Values Added
Description The package Snyk CLI before 1.1294.0 is vulnerable to Code Injection when scanning an untrusted PHP project. The vulnerability can be triggered if Snyk test is run inside the untrusted project due to the improper handling of the current working directory name. Snyk recommends only scanning trusted projects.
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2024-10-23T18:24:48.174Z

Updated: 2024-10-24T13:44:01.996Z

Reserved: 2024-10-10T12:49:33.454Z

Link: CVE-2024-48963

cve-icon Vulnrichment

Updated: 2024-10-24T13:43:54.891Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-23T19:15:19.607

Modified: 2024-10-30T14:54:53.937

Link: CVE-2024-48963

cve-icon Redhat

No data.