CVE-2022-39327

Azure CLI is the command-line interface for Microsoft Azure. In versions previous to 2.40.0, Azure CLI contains a vulnerability for potential code injection. Critical scenarios are where a hosting machine runs an Azure CLI command where parameter values have been provided by an external source. The vulnerability is only applicable when the Azure CLI command is run on a Windows machine and with any version of PowerShell and when the parameter value contains the `&` or `|` symbols. If any of these prerequisites are not met, this vulnerability is not applicable. Users should upgrade to version 2.40.0 or greater to receive a a mitigation for the vulnerability.
References
Link Resource
https://github.com/Azure/azure-cli/pull/23514 Exploit Patch Third Party Advisory
https://github.com/Azure/azure-cli/pull/24015 Patch Third Party Advisory
https://github.com/Azure/azure-cli/security/advisories/GHSA-47xc-9rr2-q7p4 Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:azure_command-line_interface:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

27 Jun 2023, 17:20

Type Values Removed Values Added
CWE CWE-94 CWE-78

Information

Published : 2022-10-25 17:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-39327

Mitre link : CVE-2022-39327

CVE.ORG link : CVE-2022-39327


JSON object : View

Products Affected

microsoft

  • azure_command-line_interface
  • windows
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')