// For flags

CVE-2022-35976

Improper KubeConfig handling allows arbitrary code execution

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The GitOps Tools Extension for VSCode relies on kubeconfigs in order to communicate with Kubernetes clusters. A specially crafted kubeconfig leads to arbitrary code execution on behalf of the user running VSCode. Users relying on kubeconfigs that are generated or altered by other processes or users are affected by this issue. Please note that the vulnerability is specific to this extension, and the same kubeconfig would not result in arbitrary code execution when used with kubectl. Using only trust-worthy kubeconfigs is a safe mitigation. However, updating to the latest version of the extension is still highly recommended.

La extensión de GitOps Tools para VSCode es basada en kubeconfigs para comunicarse con los clusters de Kubernetes. Una kubeconfig especialmente diseñada conlleva a una ejecución de código arbitrario en nombre del usuario que ejecuta VSCode. Los usuarios que dependen de kubeconfigs generados o alterados por otros procesos o usuarios están afectados por este problema. Tenga en cuenta que la vulnerabilidad es específica de esta extensión, y el mismo kubeconfig no resultaría en la ejecución de código arbitrario cuando es usada con kubectl. usar sólo kubeconfigs confiables es una mitigación segura. Sin embargo, la actualización a la última versión de la extensión sigue siendo muy recomendable.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-15 CVE Reserved
  • 2022-08-18 CVE Published
  • 2024-03-10 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Weave
Search vendor "Weave"
Gitops Tools
Search vendor "Weave" for product "Gitops Tools"
>= 0.5.0 <= 0.20.9
Search vendor "Weave" for product "Gitops Tools" and version " >= 0.5.0 <= 0.20.9"
visual_studio_code
Affected