Microsoft Visual Studio code execution | CVE-2022-24765
NAME
Microsoft Visual Studio code execution
- Platforms Affected:
Microsoft Visual Studio 2019 16.0
Microsoft Visual Studio 2019 16.1
Microsoft Visual Studio 2019 16.2
Microsoft Visual Studio 2019 16.3
Microsoft Visual Studio 2019 16.4
Microsoft Visual Studio 2019 16.5
Microsoft Visual Studio 2019 16.6
Microsoft Visual Studio 2019 16.7
Microsoft Visual Studio 2019 16.8
Microsoft Visual Studio 2019 16.9
Microsoft Visual Studio 2019 16.10
Microsoft Visual Studio 2019 16.11 - Risk Level:
9.8 - Exploitability:
Unproven - Consequences:
Gain Access
DESCRIPTION
Microsoft Visual Studio could allow a remote attacker to execute arbitrary code on the system, caused by an uncontrolled search for the Git directory in Git. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS 3.0 Information
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Access Vector: Network
- Access Complexity: Low
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
- Remediation Level: Official Fix
MITIGATION
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches. See references.
- Reference Link:
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2022-24765 - Reference Link:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.