CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-48963

Critical Severity
Snyk
SVRS
84/100

CVSSv3
9.8/10

EPSS
0.00021/1

CVE-2024-48963 allows for code injection in the Snyk CLI. This vulnerability, present in Snyk CLI versions before 1.1294.0, arises when scanning untrusted PHP projects due to mishandling of the current working directory name. With a SOCRadar Vulnerability Risk Score (SVRS) of 84, this vulnerability is considered critical and demands immediate attention. Exploitation occurs when running 'Snyk test' within an untrusted project. This could allow attackers to execute arbitrary code on systems running the Snyk CLI. Users are strongly advised to only scan trusted projects and update to the latest version of Snyk CLI to mitigate the risk of this actively exploited vulnerability. The high SVRS reflects real-world exploitability and the potential for significant impact.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:H
I:H
A:H
2024-10-23

2024-10-30
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-48963 is a code injection vulnerability in Snyk CLI before version 1.1294.0. This vulnerability allows an attacker to execute arbitrary code on a victim's system by tricking them into running the Snyk test inside an untrusted PHP project. The vulnerability has a CVSS score of 7.5, indicating a high severity level. However, the SOCRadar Vulnerability Risk Score (SVRS) is 46, indicating a moderate risk level. This is because the vulnerability requires specific conditions to be exploited and is not as easily exploitable as other vulnerabilities with a higher CVSS score.

Key Insights

  • The vulnerability can be exploited by attackers to execute arbitrary code on a victim's system.
  • The vulnerability is only exploitable if the victim runs the Snyk test inside an untrusted PHP project.
  • Snyk recommends only scanning trusted projects to mitigate the risk of exploitation.
  • The vulnerability is not currently being actively exploited in the wild.

Mitigation Strategies

  • Update Snyk CLI to version 1.1294.0 or later.
  • Only scan trusted PHP projects.
  • Use a web application firewall (WAF) to block malicious requests.
  • Implement input validation to prevent attackers from submitting malicious code.

Additional Information

  • Threat Actors/APT Groups: None known
  • Exploit Status: No active exploits published
  • CISA Warnings: None
  • In the Wild: No

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-48963 | Snyk Cli 1.996.0 PHP Project Scanning os command injection
vuldb.com2024-10-23
CVE-2024-48963 | Snyk Cli 1.996.0 PHP Project Scanning os command injection | A vulnerability classified as critical has been found in Snyk Cli 1.996.0. This affects an unknown part of the component PHP Project Scanning. The manipulation leads to os command injection. This vulnerability is uniquely identified as CVE-2024-48963. It is possible to initiate the attack remotely. There is no exploit available
rss
vuldb.com
forum
news

Social Media

🚨 CVE-2024-48963: Critical vuln in Snyk Cli 1.996.0 PHP scanning leads to OS command injection. Upgrade Snyk Cli immediately to mitigate risks of remote attacks. Stay vigilant and patch promptly. #CyberSecurity #VulnerabilityManagement
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppSnyksnyk_cli

References

ReferenceLink
[email protected]https://github.com/snyk/snyk-php-plugin/releases/tag/v1.10.0

CWE Details

CWE IDCWE NameDescription
CWE-78Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence