// For flags

CVE-2022-22984

Command Injection

Severity Score

6.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

9
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the package @snyk/snyk-hex-plugin before 1.1.6 are vulnerable to Command Injection due to an incomplete fix for [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342). A successful exploit allows attackers to run arbitrary commands on the host system where the Snyk CLI is installed by passing in crafted command line flags. In order to exploit this vulnerability, a user would have to execute the snyk test command on untrusted files. In most cases, an attacker positioned to control the command line arguments to the Snyk CLI would already be positioned to execute arbitrary commands. However, this could be abused in specific scenarios, such as continuous integration pipelines, where developers can control the arguments passed to the Snyk CLI to leverage this component as part of a wider attack against an integration/build pipeline. This issue has been addressed in the latest Snyk Docker images available at https://hub.docker.com/r/snyk/snyk as of 2022-11-29. Images downloaded and built prior to that date should be updated. The issue has also been addressed in the Snyk TeamCity CI/CD plugin as of version v20221130.093605.

El paquete snyk antes de 1.1064.0; el paquete snyk-mvn-plugin anterior a 2.31.3; el paquete snyk-gradle-plugin anterior a 3.24.5; el paquete @snyk/snyk-cocoapods-plugin anterior a 2.5.3; el paquete snyk-sbt-plugin anterior a 2.16.2; el paquete snyk-python-plugin anterior a 1.24.2; el paquete snyk-docker-plugin anterior a 5.6.5; el paquete @snyk/snyk-hex-plugin anterior a 1.1.6 es vulnerable a la inyección de comandos debido a una solución incompleta para [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK -3037342). Un exploit exitoso permite a los atacantes ejecutar comandos arbitrarios en el sistema host donde está instalada la CLI de Snyk al pasar indicadores de línea de comando manipulado. Para aprovechar esta vulnerabilidad, un usuario tendría que ejecutar el comando snyk test en archivos que no sean de confianza. En la mayoría de los casos, un atacante posicionado para controlar los argumentos de la línea de comandos de la CLI de Snyk ya estaría posicionado para ejecutar comandos arbitrarios. Sin embargo, se podría abusar de esto en escenarios específicos, como canales de integración continua, donde los desarrolladores pueden controlar los argumentos pasados ??a la CLI de Snyk para aprovechar este componente como parte de un ataque más amplio contra un canal de integración/compilación. Este problema se solucionó en las últimas imágenes de Snyk Docker disponibles en https://hub.docker.com/r/snyk/snyk a partir del 29 de noviembre de 2022. Las imágenes descargadas y creadas antes de esa fecha deben actualizarse. El problema también se solucionó en el complemento Snyk TeamCity CI/CD a partir de la versión v20221130.093605.

*Credits: Ron Masas - Imperva
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-24 CVE Reserved
  • 2022-11-30 CVE Published
  • 2024-06-22 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (17)
URL Tag Source
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Snyk
Search vendor "Snyk"
Snyk Cli
Search vendor "Snyk" for product "Snyk Cli"
< 1.1064.0
Search vendor "Snyk" for product "Snyk Cli" and version " < 1.1064.0"
-
Affected
Snyk
Search vendor "Snyk"
Snyk Cocoapods Cli
Search vendor "Snyk" for product "Snyk Cocoapods Cli"
< 2.5.3
Search vendor "Snyk" for product "Snyk Cocoapods Cli" and version " < 2.5.3"
snyk
Affected
Snyk
Search vendor "Snyk"
Snyk Docker Cli
Search vendor "Snyk" for product "Snyk Docker Cli"
< 5.6.5
Search vendor "Snyk" for product "Snyk Docker Cli" and version " < 5.6.5"
snyk
Affected
Snyk
Search vendor "Snyk"
Snyk Gradle Cli
Search vendor "Snyk" for product "Snyk Gradle Cli"
< 3.24.5
Search vendor "Snyk" for product "Snyk Gradle Cli" and version " < 3.24.5"
snyk
Affected
Snyk
Search vendor "Snyk"
Snyk Hex Cli
Search vendor "Snyk" for product "Snyk Hex Cli"
< 1.1.6
Search vendor "Snyk" for product "Snyk Hex Cli" and version " < 1.1.6"
snyk
Affected
Snyk
Search vendor "Snyk"
Snyk Maven Cli
Search vendor "Snyk" for product "Snyk Maven Cli"
< 2.31.3
Search vendor "Snyk" for product "Snyk Maven Cli" and version " < 2.31.3"
snyk
Affected
Snyk
Search vendor "Snyk"
Snyk Python Cli
Search vendor "Snyk" for product "Snyk Python Cli"
< 1.24.2
Search vendor "Snyk" for product "Snyk Python Cli" and version " < 1.24.2"
snyk
Affected
Snyk
Search vendor "Snyk"
Snyk Sbt Cli
Search vendor "Snyk" for product "Snyk Sbt Cli"
< 2.16.2
Search vendor "Snyk" for product "Snyk Sbt Cli" and version " < 2.16.2"
snyk
Affected