Vulnerability Details CVE-2021-22539
An attacker can place a crafted JSON config file into the project folder pointing to a custom executable. VScode-bazel allows the workspace path to lint *.bzl files to be set via this config file. As such the attacker is able to execute any executable on the system through vscode-bazel. We recommend upgrading to version 0.4.1 or above.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 25.7%
CVSS Severity
CVSS v3 Score 8.2
CVSS v2 Score 6.8
Products affected by CVE-2021-22539
-
cpe:2.3:a:google:bazel:0.1.0
-
cpe:2.3:a:google:bazel:0.2.0
-
cpe:2.3:a:google:bazel:0.3.0
-
cpe:2.3:a:google:bazel:0.4.0