Lucene search

K
cveVulDBCVE-2024-7738
HistoryAug 13, 2024 - 7:15 p.m.

CVE-2024-7738

2024-08-1319:15:17
CWE-22
CWE-21
VulDB
web.nvd.nist.gov
28
vulnerability
yzane vscode-markdown-pdf
1.5.0
markdown file handler
pathname traversal
local attack
public disclosure

CVSS2

1.7

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:S/C:P/I:N/A:N

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS4

4.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/SC:N/VI:N/SI:N/VA:N/SA:N

AI Score

4

Confidence

High

EPSS

0

Percentile

5.1%

A vulnerability, which was classified as problematic, has been found in yzane vscode-markdown-pdf 1.5.0. Affected by this issue is some unknown functionality of the component Markdown File Handler. The manipulation leads to pathname traversal. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.

Affected configurations

Nvd
Vulners
Vulnrichment
Node
yzanemarkdown_pdfMatch1.5.0vscode
VendorProductVersionCPE
yzanemarkdown_pdf1.5.0cpe:2.3:a:yzane:markdown_pdf:1.5.0:*:*:*:*:vscode:*:*

CNA Affected

[
  {
    "vendor": "yzane",
    "product": "vscode-markdown-pdf",
    "versions": [
      {
        "version": "1.5.0",
        "status": "affected"
      }
    ],
    "modules": [
      "Markdown File Handler"
    ]
  }
]

CVSS2

1.7

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:S/C:P/I:N/A:N

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS4

4.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/SC:N/VI:N/SI:N/VA:N/SA:N

AI Score

4

Confidence

High

EPSS

0

Percentile

5.1%

Related for CVE-2024-7738