CVE-2019-16765

If an attacker can get a user to open a specially prepared directory tree as a workspace in Visual Studio Code with the CodeQL extension active, arbitrary code of the attacker's choosing may be executed on the user's behalf. This is fixed in version 1.0.1 of the extension. Users should upgrade to this version using Visual Studio Code Marketplace's upgrade mechanism. After upgrading, the codeQL.cli.executablePath setting can only be set in the per-user settings, and not in the per-workspace settings. More information about VS Code settings can be found here.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microsoft:codeql:*:*:*:*:*:visual_studio_code:*:*

History

No history.

Information

Published : 2019-11-25 18:15

Updated : 2024-02-28 17:28


NVD link : CVE-2019-16765

Mitre link : CVE-2019-16765

CVE.ORG link : CVE-2019-16765


JSON object : View

Products Affected

microsoft

  • codeql
CWE
NVD-CWE-noinfo CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-250

Execution with Unnecessary Privileges