CVE-2022-22984
Command Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
9Exploited in Wild
-Decision
Descriptions
The package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the package @snyk/snyk-hex-plugin before 1.1.6 are vulnerable to Command Injection due to an incomplete fix for [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342). A successful exploit allows attackers to run arbitrary commands on the host system where the Snyk CLI is installed by passing in crafted command line flags. In order to exploit this vulnerability, a user would have to execute the snyk test command on untrusted files. In most cases, an attacker positioned to control the command line arguments to the Snyk CLI would already be positioned to execute arbitrary commands. However, this could be abused in specific scenarios, such as continuous integration pipelines, where developers can control the arguments passed to the Snyk CLI to leverage this component as part of a wider attack against an integration/build pipeline. This issue has been addressed in the latest Snyk Docker images available at https://hub.docker.com/r/snyk/snyk as of 2022-11-29. Images downloaded and built prior to that date should be updated. The issue has also been addressed in the Snyk TeamCity CI/CD plugin as of version v20221130.093605.
El paquete snyk antes de 1.1064.0; el paquete snyk-mvn-plugin anterior a 2.31.3; el paquete snyk-gradle-plugin anterior a 3.24.5; el paquete @snyk/snyk-cocoapods-plugin anterior a 2.5.3; el paquete snyk-sbt-plugin anterior a 2.16.2; el paquete snyk-python-plugin anterior a 1.24.2; el paquete snyk-docker-plugin anterior a 5.6.5; el paquete @snyk/snyk-hex-plugin anterior a 1.1.6 es vulnerable a la inyección de comandos debido a una solución incompleta para [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK -3037342). Un exploit exitoso permite a los atacantes ejecutar comandos arbitrarios en el sistema host donde está instalada la CLI de Snyk al pasar indicadores de línea de comando manipulado. Para aprovechar esta vulnerabilidad, un usuario tendría que ejecutar el comando snyk test en archivos que no sean de confianza. En la mayoría de los casos, un atacante posicionado para controlar los argumentos de la línea de comandos de la CLI de Snyk ya estaría posicionado para ejecutar comandos arbitrarios. Sin embargo, se podría abusar de esto en escenarios específicos, como canales de integración continua, donde los desarrolladores pueden controlar los argumentos pasados ??a la CLI de Snyk para aprovechar este componente como parte de un ataque más amplio contra un canal de integración/compilación. Este problema se solucionó en las últimas imágenes de Snyk Docker disponibles en https://hub.docker.com/r/snyk/snyk a partir del 29 de noviembre de 2022. Las imágenes descargadas y creadas antes de esa fecha deben actualizarse. El problema también se solucionó en el complemento Snyk TeamCity CI/CD a partir de la versión v20221130.093605.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-02-24 CVE Reserved
- 2022-11-30 CVE Published
- 2024-06-22 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (17)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Snyk Search vendor "Snyk" | Snyk Cli Search vendor "Snyk" for product "Snyk Cli" | < 1.1064.0 Search vendor "Snyk" for product "Snyk Cli" and version " < 1.1064.0" | - |
Affected
| ||||||
Snyk Search vendor "Snyk" | Snyk Cocoapods Cli Search vendor "Snyk" for product "Snyk Cocoapods Cli" | < 2.5.3 Search vendor "Snyk" for product "Snyk Cocoapods Cli" and version " < 2.5.3" | snyk |
Affected
| ||||||
Snyk Search vendor "Snyk" | Snyk Docker Cli Search vendor "Snyk" for product "Snyk Docker Cli" | < 5.6.5 Search vendor "Snyk" for product "Snyk Docker Cli" and version " < 5.6.5" | snyk |
Affected
| ||||||
Snyk Search vendor "Snyk" | Snyk Gradle Cli Search vendor "Snyk" for product "Snyk Gradle Cli" | < 3.24.5 Search vendor "Snyk" for product "Snyk Gradle Cli" and version " < 3.24.5" | snyk |
Affected
| ||||||
Snyk Search vendor "Snyk" | Snyk Hex Cli Search vendor "Snyk" for product "Snyk Hex Cli" | < 1.1.6 Search vendor "Snyk" for product "Snyk Hex Cli" and version " < 1.1.6" | snyk |
Affected
| ||||||
Snyk Search vendor "Snyk" | Snyk Maven Cli Search vendor "Snyk" for product "Snyk Maven Cli" | < 2.31.3 Search vendor "Snyk" for product "Snyk Maven Cli" and version " < 2.31.3" | snyk |
Affected
| ||||||
Snyk Search vendor "Snyk" | Snyk Python Cli Search vendor "Snyk" for product "Snyk Python Cli" | < 1.24.2 Search vendor "Snyk" for product "Snyk Python Cli" and version " < 1.24.2" | snyk |
Affected
| ||||||
Snyk Search vendor "Snyk" | Snyk Sbt Cli Search vendor "Snyk" for product "Snyk Sbt Cli" | < 2.16.2 Search vendor "Snyk" for product "Snyk Sbt Cli" and version " < 2.16.2" | snyk |
Affected
|