CVE-2024-48964 – snyk-gradle-plugin
Package
Manager: npm
Name: snyk-gradle-plugin
Vulnerable Version: >=0 <4.5.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
EPSS: 0.00054 pctl0.16922
Details
OS Command Injection in Snyk gradle plugin The Snyk gradle plugin is vulnerable to Code Injection when scanning an untrusted Gradle project. The vulnerability can be triggered if Snyk test is run inside the untrusted project due to the improper handling of the current working directory name. Snyk recommends only scanning trusted projects.
Metadata
Created: 2024-10-23T21:30:28Z
Modified: 2024-10-23T21:41:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-qqqw-gm93-qf6m/GHSA-qqqw-gm93-qf6m.json
CWE IDs: ["CWE-78", "CWE-94"]
Alternative ID: GHSA-qqqw-gm93-qf6m
Finding: F404
Auto approve: 1