Lucene search

K
archlinuxArchLinuxASA-202107-34
HistoryJul 20, 2021 - 12:00 a.m.

[ASA-202107-34] code: arbitrary code execution

2021-07-2000:00:00
security.archlinux.org
118
arbitrary code execution
visual studio code
cve-2021-31211
cve-2021-31214
remote terminal
javascript task runner

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.012

Percentile

85.3%

Arch Linux Security Advisory ASA-202107-34

Severity: Medium
Date : 2021-07-20
CVE-ID : CVE-2021-31211 CVE-2021-31214
Package : code
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1963

Summary

The package code before version 1.58.0-1 is vulnerable to arbitrary
code execution.

Resolution

Upgrade to 1.58.0-1.

pacman -Syu “code>=1.58.0-1”

The problems have been fixed upstream in version 1.58.0.

Workaround

None.

Description

  • CVE-2021-31211 (arbitrary code execution)

An arbitrary code execution vulnerability through crafted remote
terminal settings has been found in Visual Studio Code before version
1.57.0.

  • CVE-2021-31214 (arbitrary code execution)

An arbitrary code execution vulnerability in the Grunt, Gulp and Jake
task auto detection has been found in Visual Studio Code before version
1.57.0.

Impact

An attacker could execute arbitrary code through crafted remote
terminal settings or JavaScript task runner configuration files without
user interaction.

References

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31211
https://github.com/microsoft/vscode/issues/123590
https://github.com/microsoft/vscode/commit/7259955ce318a2bb2a86ee121c34dcaab0a86e45
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31214
https://github.com/microsoft/vscode/issues/123588
https://github.com/microsoft/vscode/commit/5f3466a21e80b2c016a1c0cbe2af683c9072d0a7
https://security.archlinux.org/CVE-2021-31211
https://security.archlinux.org/CVE-2021-31214

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanycode< 1.58.0-1UNKNOWN

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.012

Percentile

85.3%