Vulnerability Details : CVE-2022-22984
Potential exploit
The package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the package @snyk/snyk-hex-plugin before 1.1.6 are vulnerable to Command Injection due to an incomplete fix for [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342). A successful exploit allows attackers to run arbitrary commands on the host system where the Snyk CLI is installed by passing in crafted command line flags. In order to exploit this vulnerability, a user would have to execute the snyk test command on untrusted files. In most cases, an attacker positioned to control the command line arguments to the Snyk CLI would already be positioned to execute arbitrary commands. However, this could be abused in specific scenarios, such as continuous integration pipelines, where developers can control the arguments passed to the Snyk CLI to leverage this component as part of a wider attack against an integration/build pipeline. This issue has been addressed in the latest Snyk Docker images available at https://hub.docker.com/r/snyk/snyk as of 2022-11-29. Images downloaded and built prior to that date should be updated. The issue has also been addressed in the Snyk TeamCity CI/CD plugin as of version v20221130.093605.
Products affected by CVE-2022-22984
- cpe:2.3:a:snyk:snyk_cli:*:*:*:*:*:*:*:*
- cpe:2.3:a:snyk:snyk_maven_cli:*:*:*:*:*:snyk:*:*
- cpe:2.3:a:snyk:snyk_gradle_cli:*:*:*:*:*:snyk:*:*
- cpe:2.3:a:snyk:snyk_cocoapods_cli:*:*:*:*:*:snyk:*:*
- cpe:2.3:a:snyk:snyk_python_cli:*:*:*:*:*:snyk:*:*
- cpe:2.3:a:snyk:snyk_sbt_cli:*:*:*:*:*:snyk:*:*
- cpe:2.3:a:snyk:snyk_docker_cli:*:*:*:*:*:snyk:*:*
- cpe:2.3:a:snyk:snyk_hex_cli:*:*:*:*:*:snyk:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-22984
1.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-22984
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
NIST | |
5.0
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L |
1.6
|
3.4
|
Snyk |
CWE ids for CVE-2022-22984
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2022-22984
-
https://security.snyk.io/vuln/SNYK-JS-SNYKSBTPLUGIN-3038626
Command Injection in snyk-sbt-plugin | CVE-2022-22984 | SnykExploit;Patch;Vendor Advisory
-
https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKHEXPLUGIN-3039680
Command Injection in @snyk/snyk-hex-plugin | CVE-2022-22984 | SnykExploit;Patch;Vendor Advisory
-
https://github.com/snyk/snyk-hex-plugin/commit/e8dd2a330b40d7fc0ab47e34413e80a0146d7ac3
fix: quote spawn args · snyk/snyk-hex-plugin@e8dd2a3 · GitHubPatch;Third Party Advisory
-
https://security.snyk.io/vuln/SNYK-JS-SNYKMVNPLUGIN-3038623
Command Injection in snyk-mvn-plugin | CVE-2022-22984 | SnykExploit;Patch;Vendor Advisory
-
https://github.com/snyk/snyk-docker-plugin/commit/d730d7630691a61587b120bb11daaaf4b58a8357
fix: quote spawn args · snyk/snyk-docker-plugin@d730d76 · GitHubPatch;Third Party Advisory
-
https://security.snyk.io/vuln/SNYK-JS-SNYKPYTHONPLUGIN-3039677
Command Injection in snyk-python-plugin | CVE-2022-22984 | SnykExploit;Patch;Vendor Advisory
-
https://security.snyk.io/vuln/SNYK-JS-SNYK-3038622
Command Injection in snyk | CVE-2022-22984 | SnykExploit;Patch;Vendor Advisory
-
https://github.com/snyk/snyk-cocoapods-plugin/commit/c73e049c5200772babde61c40aab57296bf91381
fix: quote args · snyk/snyk-cocoapods-plugin@c73e049 · GitHubPatch;Third Party Advisory
-
https://github.com/snyk/snyk-mvn-plugin/commit/02cda9ba1ea36b00ead3f6ec2de0f97397ebec50
fix: escape child process arguments · snyk/snyk-mvn-plugin@02cda9b · GitHubPatch;Third Party Advisory
-
https://github.com/snyk/cli/commit/80d97a93326406e09776156daf72e3caa03ae25a
fix: escape child process arguments · snyk/cli@80d97a9 · GitHubPatch;Third Party Advisory
-
https://github.com/snyk/snyk-sbt-plugin/commit/99c09eb12c9f8f2b237aea9627aab1ae3cab6437
fix: escape child process arguments · snyk/snyk-sbt-plugin@99c09eb · GitHubPatch;Third Party Advisory
-
https://www.imperva.com/blog/how-scanning-your-projects-for-security-issues-can-lead-to-remote-code-execution/
How Scanning Your Projects for Security Issues Can Lead to Remote Code Execution | ImpervaExploit;Third Party Advisory
-
https://github.com/snyk/snyk-gradle-plugin/commit/bb1c1c72a75e97723a76b14d2d73f70744ed5009
fix: escape child process arguments · snyk/snyk-gradle-plugin@bb1c1c7 · GitHubPatch;Third Party Advisory
-
https://security.snyk.io/vuln/SNYK-JS-SNYKDOCKERPLUGIN-3039679
Command Injection in snyk-docker-plugin | CVE-2022-22984 | SnykExploit;Patch;Vendor Advisory
-
https://security.snyk.io/vuln/SNYK-JS-SNYKGRADLEPLUGIN-3038624
Command Injection in snyk-gradle-plugin | CVE-2022-22984 | SnykExploit;Patch;Vendor Advisory
-
https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625
Command Injection in @snyk/snyk-cocoapods-plugin | CVE-2022-22984 | SnykExploit;Patch;Vendor Advisory
-
https://github.com/snyk/snyk-python-plugin/commit/8591abdd9236108ac3e30c70c09238d6bb6aabf4
fix: quote spawn args · snyk/snyk-python-plugin@8591abd · GitHubPatch;Third Party Advisory
Jump to