CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
85.3%
Severity: Medium
Date : 2021-07-20
CVE-ID : CVE-2021-31211 CVE-2021-31214
Package : code
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1963
The package code before version 1.58.0-1 is vulnerable to arbitrary
code execution.
Upgrade to 1.58.0-1.
The problems have been fixed upstream in version 1.58.0.
None.
An arbitrary code execution vulnerability through crafted remote
terminal settings has been found in Visual Studio Code before version
1.57.0.
An arbitrary code execution vulnerability in the Grunt, Gulp and Jake
task auto detection has been found in Visual Studio Code before version
1.57.0.
An attacker could execute arbitrary code through crafted remote
terminal settings or JavaScript task runner configuration files without
user interaction.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31211
https://github.com/microsoft/vscode/issues/123590
https://github.com/microsoft/vscode/commit/7259955ce318a2bb2a86ee121c34dcaab0a86e45
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31214
https://github.com/microsoft/vscode/issues/123588
https://github.com/microsoft/vscode/commit/5f3466a21e80b2c016a1c0cbe2af683c9072d0a7
https://security.archlinux.org/CVE-2021-31211
https://security.archlinux.org/CVE-2021-31214
github.com/microsoft/vscode/commit/5f3466a21e80b2c016a1c0cbe2af683c9072d0a7
github.com/microsoft/vscode/commit/7259955ce318a2bb2a86ee121c34dcaab0a86e45
github.com/microsoft/vscode/issues/123588
github.com/microsoft/vscode/issues/123590
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31211
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31214
security.archlinux.org/AVG-1963
security.archlinux.org/CVE-2021-31211
security.archlinux.org/CVE-2021-31214
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
85.3%