漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Code execution in VSCode-bazel via malicious Bazel config files
Vulnerability Description
An attacker can place a crafted JSON config file into the project folder pointing to a custom executable. VScode-bazel allows the workspace path to lint *.bzl files to be set via this config file. As such the attacker is able to execute any executable on the system through vscode-bazel. We recommend upgrading to version 0.4.1 or above.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Vulnerability Type
文件名或路径的外部可控制
Vulnerability Title
Philipp Wollermann VScode-bazel 安全漏洞
Vulnerability Description
Philipp Wollermann vscode-bazel是Philipp Wollermann开源的一个应用软件。用于Visual Studio Code的Bazel插件。 VScode-bazel 0.4.1之前版本存在安全漏洞,攻击者可利用该漏洞可以通过vscode-bazel在系统上执行任何可执行文件。
CVSS Information
N/A
Vulnerability Type
N/A