GHSA-qqqw-gm93-qf6m

Suggest an improvement
Source
https://github.com/advisories/GHSA-qqqw-gm93-qf6m
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-qqqw-gm93-qf6m/GHSA-qqqw-gm93-qf6m.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qqqw-gm93-qf6m
Aliases
Related
Published
2024-10-23T21:30:28Z
Modified
2024-10-23T21:57:05.344009Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
  • 7.5 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
OS Command Injection in Snyk gradle plugin
Details

The Snyk gradle plugin is vulnerable to Code Injection when scanning an untrusted Gradle project. The vulnerability can be triggered if Snyk test is run inside the untrusted project due to the improper handling of the current working directory name. Snyk recommends only scanning trusted projects.

Database specific
{
    "nvd_published_at": "2024-10-23T19:15:19Z",
    "cwe_ids": [
        "CWE-78",
        "CWE-94"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-10-23T21:41:02Z"
}
References

Affected packages

npm / snyk-gradle-plugin

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.0