Arbitrary Code Execution through Crafted JSON Config File in VScode-bazel

Arbitrary Code Execution through Crafted JSON Config File in VScode-bazel

CVE-2021-22539 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

An attacker can place a crafted JSON config file into the project folder pointing to a custom executable. VScode-bazel allows the workspace path to lint *.bzl files to be set via this config file. As such the attacker is able to execute any executable on the system through vscode-bazel. We recommend upgrading to version 0.4.1 or above.

Learn more about our Cis Benchmark Audit For Google Workspace.