#VU47693 Input validation error


Published: 2020-10-16

Vulnerability identifier: #VU47693

Vulnerability risk: High

CVSSv3: 7.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-17023

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software: Visual Studio Code
Universal components / Libraries / Software for developers

Vendor: Microsoft

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input when processing 'package.json' file. A remote attacker can trick the victim to load a specially crafted 'package.json' file and execute arbitrary code on the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Visual Studio Code: 1.0.0, 1.1.0, 1.1.1, 1.2.0, 1.2.1, 1.3.0, 1.3.1, 1.4.0, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.6.0, 1.6.1, 1.7.0, 1.7.1, 1.7.2, 1.8.0, 1.8.1, 1.9.0, 1.9.1, 1.10.0, 1.10.1, 1.10.2, 1.11.0, 1.11.1, 1.11.2, 1.12.0, 1.12.1, 1.12.2, 1.13.0, 1.13.1, 1.14.0, 1.14.1, 1.14.2, 1.15.0, 1.15.1, 1.16.0, 1.16.1, 1.17.0, 1.17.1, 1.17.2, 1.18.0, 1.18.1, 1.19.0, 1.19.1, 1.19.2, 1.19.3, 1.20.0, 1.20.1, 1.21.0, 1.21.1, 1.22.0, 1.22.1, 1.22.2, 1.23.0, 1.23.1, 1.24.0, 1.24.1, 1.25.0, 1.25.1, 1.26.0, 1.26.1, 1.27.0, 1.27.1, 1.27.2, 1.28.0, 1.28.1, 1.28.2, 1.29.0, 1.29.1, 1.30.0, 1.30.1, 1.30.2, 1.31.0, 1.31.1, 1.32.0, 1.32.1, 1.32.2, 1.32.3, 1.33.0, 1.33.1, 1.34.0, 1.35.0, 1.35.1, 1.36.0, 1.36.1, 1.37.0, 1.37.1, 1.38.0, 1.38.1, 1.39.0, 1.39.1, 1.39.2, 1.40.0, 1.40.1, 1.40.2, 1.41.0, 1.41.1, 1.42.0, 1.42.1, 1.43.0, 1.43.1, 1.43.2, 1.44.0, 1.44.1, 1.44.2, 1.45.0, 1.45.1, 1.46.0, 1.46.1, 1.47.0, 1.47.1, 1.47.2, 1.47.3, 1.48.0, 1.48.1, 1.48.2, 1.49.0, 1.49.1, 1.49.2, 1.49.3, 1.50.0

CPE

External links
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17023


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability