CVE-2022-25962
https://notcve.org/view.php?id=CVE-2022-25962
All versions of the package vagrant.js are vulnerable to Command Injection via the boxAdd function due to improper input sanitization. Todas las versiones del paquete vagrant.js son vulnerables a la inyección de comandos a través de la función boxAdd debido a una sanitización de entrada inadecuada. • https://security.snyk.io/vuln/SNYK-JS-VAGRANTJS-3175614 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2021-21361 – Sensitive information disclosure via log in com.bmuschko:gradle-vagrant-plugin
https://notcve.org/view.php?id=CVE-2021-21361
The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed in version 3.0.0. El plugin de Gradle "com.bmuschko: gradle-vagrant-plugin" contiene una vulnerabilidad de divulgación de información debido al registro de las variables de entorno del sistema. Cuando este plugin de Gradle se ejecuta en CI/CD público, esto puede conllevar a que las credenciales confidenciales se expongan a actores maliciosos. • https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7 https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44 https://github.com/bmuschko/gradle-vagrant-plugin/issues/19 https://github.com/bmuschko/gradle-vagrant-plugin/pull/20 • CWE-532: Insertion of Sensitive Information into Log File •