CVE-2024-48963
Snyk
CVE-2024-48963 allows for code injection in the Snyk CLI. This vulnerability, present in Snyk CLI versions before 1.1294.0, arises when scanning untrusted PHP projects due to mishandling of the current working directory name. With a SOCRadar Vulnerability Risk Score (SVRS) of 84, this vulnerability is considered critical and demands immediate attention. Exploitation occurs when running 'Snyk test' within an untrusted project. This could allow attackers to execute arbitrary code on systems running the Snyk CLI. Users are strongly advised to only scan trusted projects and update to the latest version of Snyk CLI to mitigate the risk of this actively exploited vulnerability. The high SVRS reflects real-world exploitability and the potential for significant impact.
Description
CVE-2024-48963 is a code injection vulnerability in Snyk CLI before version 1.1294.0. This vulnerability allows an attacker to execute arbitrary code on a victim's system by tricking them into running the Snyk test inside an untrusted PHP project. The vulnerability has a CVSS score of 7.5, indicating a high severity level. However, the SOCRadar Vulnerability Risk Score (SVRS) is 46, indicating a moderate risk level. This is because the vulnerability requires specific conditions to be exploited and is not as easily exploitable as other vulnerabilities with a higher CVSS score.
Key Insights
- The vulnerability can be exploited by attackers to execute arbitrary code on a victim's system.
- The vulnerability is only exploitable if the victim runs the Snyk test inside an untrusted PHP project.
- Snyk recommends only scanning trusted projects to mitigate the risk of exploitation.
- The vulnerability is not currently being actively exploited in the wild.
Mitigation Strategies
- Update Snyk CLI to version 1.1294.0 or later.
- Only scan trusted PHP projects.
- Use a web application firewall (WAF) to block malicious requests.
- Implement input validation to prevent attackers from submitting malicious code.
Additional Information
- Threat Actors/APT Groups: None known
- Exploit Status: No active exploits published
- CISA Warnings: None
- In the Wild: No
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.