Lucene search

K
cveGitHub_MCVE-2021-21415
HistoryApr 29, 2021 - 5:15 p.m.

CVE-2021-21415

2021-04-2917:15:08
CWE-94
GitHub_M
web.nvd.nist.gov
26
6
cve-2021-21415
prisma
vs code
extension
remote code execution
vulnerability
security
nvd

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.008

Percentile

81.2%

Prisma VS Code a VSCode extension for Prisma schema files. This is a Remote Code Execution Vulnerability that affects all versions of the Prisma VS Code extension older than 2.20.0. If a custom binary path for the Prisma format binary is set in VS Code Settings, for example by downloading a project that has a .vscode/settings.json file that sets a value for “prismaFmtBinPath”. That custom binary is executed when auto-formatting is triggered by VS Code or when validation checks are triggered after each keypress on a *.prisma file. Fixed in versions 2.20.0 and 20.0.27. As a workaround users can either edit or delete the .vscode/settings.json file or check if the binary is malicious and delete it.

Affected configurations

Nvd
Vulners
Node
prismalanguage-toolsRange<2.20.0visual_studio_code
VendorProductVersionCPE
prismalanguage-tools*cpe:2.3:a:prisma:language-tools:*:*:*:*:*:visual_studio_code:*:*

CNA Affected

[
  {
    "product": "language-tools",
    "vendor": "prisma",
    "versions": [
      {
        "status": "affected",
        "version": ">= 2.1.0, < 2.20.0"
      },
      {
        "status": "affected",
        "version": "< 20.0.27"
      }
    ]
  }
]

Social References

More

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.008

Percentile

81.2%

Related for CVE-2021-21415