Skip to content

Commit 296cf69

Browse files
committed
security/vuxml: document vscode remote code execution vulnerability
Obtained from: microsoft/vscode#192906
1 parent 616179b commit 296cf69

File tree

1 file changed

+29
-0
lines changed

1 file changed

+29
-0
lines changed

security/vuxml/vuln/2023.xml

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,32 @@
1+
<vuln vid="4bc66a81-89d2-4696-a04b-defd2eb77783">
2+
<topic>vscode -- VS Code Remote Code Execution Vulnerability</topic>
3+
<affects>
4+
<package>
5+
<name>vscode</name>
6+
<range><lt>1.82.1</lt></range>
7+
</package>
8+
</affects>
9+
<description>
10+
<body xmlns="http://www.w3.org/1999/xhtml">
11+
<p>VSCode developers report:</p>
12+
<blockquote cite="https://github.com/microsoft/vscode/security/advisories/GHSA-r6q2-478f-5gmr">
13+
<p>Visual Studio Code Remote Code Execution Vulnerability</p>
14+
<p>A remote code execution vulnerability exists in VS Code 1.82.0 and earlier versions that working in a maliciously crafted package.json can result in executing commands locally. This scenario would require the attacker to get the VS Code user to open the malicious project and have get the user to open and work with malformed entries in the dependencies sections of the package.json file.</p>
15+
<p>VS Code uses the locally installed npm command to fetch information on package dependencies. A package dependency can be named in such a way that the npm tool runs a script instead.</p>
16+
</blockquote>
17+
</body>
18+
</description>
19+
<references>
20+
<cvename>CVE-2023-36742</cvename>
21+
<url>https://nvd.nist.gov/vuln/detail/CVE-2023-36742</url>
22+
<url>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36742</url>
23+
</references>
24+
<dates>
25+
<discovery>2023-09-12</discovery>
26+
<entry>2023-09-13</entry>
27+
</dates>
28+
</vuln>
29+
130
<vuln vid="8eefa87f-31f1-496d-bf8e-2b465b6e4e8a">
231
<topic>zeek -- potential DoS vulnerabilities</topic>
332
<affects>

0 commit comments

Comments
 (0)