Remote code execution in Visual Studio Code



Published: 2020-10-16
Risk High
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2020-17023
CWE ID CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Visual Studio Code
Universal components / Libraries / Software for developers

Vendor Microsoft

Security Advisory

This security advisory describes one high risk vulnerability.

1) Input validation error

Risk: High

CVSSv3: 7.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-17023

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input when processing 'package.json' file. A remote attacker can trick the victim to load a specially crafted 'package.json' file and execute arbitrary code on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Visual Studio Code: 1.0.0, 1.1.0, 1.1.1, 1.2.0, 1.2.1, 1.3.0, 1.3.1, 1.4.0, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.6.0, 1.6.1, 1.7.0, 1.7.1, 1.7.2, 1.8.0, 1.8.1, 1.9.0, 1.9.1, 1.10.0, 1.10.1, 1.10.2, 1.11.0, 1.11.1, 1.11.2, 1.12.0, 1.12.1, 1.12.2, 1.13.0, 1.13.1, 1.14.0, 1.14.1, 1.14.2, 1.15.0, 1.15.1, 1.16.0, 1.16.1, 1.17.0, 1.17.1, 1.17.2, 1.18.0, 1.18.1, 1.19.0, 1.19.1, 1.19.2, 1.19.3, 1.20.0, 1.20.1, 1.21.0, 1.21.1, 1.22.0, 1.22.1, 1.22.2, 1.23.0, 1.23.1, 1.24.0, 1.24.1, 1.25.0, 1.25.1, 1.26.0, 1.26.1, 1.27.0, 1.27.1, 1.27.2, 1.28.0, 1.28.1, 1.28.2, 1.29.0, 1.29.1, 1.30.0, 1.30.1, 1.30.2, 1.31.0, 1.31.1, 1.32.0, 1.32.1, 1.32.2, 1.32.3, 1.33.0, 1.33.1, 1.34.0, 1.35.0, 1.35.1, 1.36.0, 1.36.1, 1.37.0, 1.37.1, 1.38.0, 1.38.1, 1.39.0, 1.39.1, 1.39.2, 1.40.0, 1.40.1, 1.40.2, 1.41.0, 1.41.1, 1.42.0, 1.42.1, 1.43.0, 1.43.1, 1.43.2, 1.44.0, 1.44.1, 1.44.2, 1.45.0, 1.45.1, 1.46.0, 1.46.1, 1.47.0, 1.47.1, 1.47.2, 1.47.3, 1.48.0, 1.48.1, 1.48.2, 1.49.0, 1.49.1, 1.49.2, 1.49.3, 1.50.0

CPE External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17023

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.