Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2021-22539

An attacker can place a crafted JSON config file into the project folder pointing to a custom executable. VScode-bazel allows the workspace path to lint *.bzl files to be set via this config file. As such the attacker is able to execute any executable on the system through vscode-bazel. We recommend upgrading to version 0.4.1 or above.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 25.7%
CVSS Severity
CVSS v3 Score 8.2
CVSS v2 Score 6.8
Products affected by CVE-2021-22539
  • Google » Bazel » Version: 0.1.0
    cpe:2.3:a:google:bazel:0.1.0
  • Google » Bazel » Version: 0.2.0
    cpe:2.3:a:google:bazel:0.2.0
  • Google » Bazel » Version: 0.3.0
    cpe:2.3:a:google:bazel:0.3.0
  • Google » Bazel » Version: 0.4.0
    cpe:2.3:a:google:bazel:0.4.0


Contact Us

Shodan ® - All rights reserved