Lucene search

K
cvelistGitHub_MCVELIST:CVE-2019-16765
HistoryNov 25, 2019 - 5:41 p.m.

CVE-2019-16765

2019-11-2517:41:17
CWE-250
CWE-22
GitHub_M
www.cve.org

7.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

44.7%

If an attacker can get a user to open a specially prepared directory tree as a workspace in Visual Studio Code with the CodeQL extension active, arbitrary code of the attacker’s choosing may be executed on the user’s behalf. This is fixed in version 1.0.1 of the extension. Users should upgrade to this version using Visual Studio Code Marketplace’s upgrade mechanism. After upgrading, the codeQL.cli.executablePath setting can only be set in the per-user settings, and not in the per-workspace settings. More information about VS Code settings can be found here.

CNA Affected

[
  {
    "product": "vscode-codeql",
    "vendor": "github",
    "versions": [
      {
        "lessThan": "1.0.1",
        "status": "affected",
        "version": "< 1.0.1",
        "versionType": "custom"
      }
    ]
  }
]

7.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

44.7%

Related for CVELIST:CVE-2019-16765