Miggo Logo

CVE-2022-24441: snyk Code Injection vulnerability

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.77653%
Published
7/6/2023
Updated
7/6/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
snyknpm< 1.1064.01.1064.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from executing build processes/CLI commands without proper trust validation. Patches across all platforms added trust checks (checkIfTrusted, confirmScanningAndSetWorkspaceTrustedStateIfNeeded, trustedFolders) filtering before command execution. The vulnerable functions are the pre-patch versions of these methods that lacked trust validation, allowing malicious build file commands to execute when scanning untrusted projects.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** p**k*** snyk ***or* *.****.* is vuln*r**l* to *o** Inj**tion w**n *n*lyzin* * proj**t. *n *tt**k*r w*o **n *onvin** * us*r to s**n * m*li*ious proj**t **n in*lu** *omm*n*s in * *uil* *il* su** *s *uil*.*r**l* or *r**l*-wr*pp*r.j*r, w*i** will **

Reasoning

T** vuln*r**ility st*ms *rom *x**utin* *uil* pro**ss*s/*LI *omm*n*s wit*out prop*r trust v*li**tion. P*t***s **ross *ll pl*t*orms ***** trust ****ks (`****kI*Trust**`, `*on*irmS**nnin**n*S*tWorksp***Trust**St*t*I*N*****`, `trust***ol**rs`) *ilt*rin*