CVE-2023-39523

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-39523
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-39523.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-39523
Aliases
Published
2023-08-07T21:15:09Z
Modified
2024-10-12T11:02:25.972753Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

ScanCode.io is a server to script and automate software composition analysis with ScanPipe pipelines. Prior to version 32.5.1, the software has a possible command injection vulnerability in the docker fetch process as it allows to append malicious commands in the docker_reference parameter.

In the function scanpipe/pipes/fetch.py:fetch_docker_image the parameter docker_reference is user controllable. The docker_reference variable is then passed to the vulnerable function get_docker_image_platform. However, the get_docker_image_plaform function constructs a shell command with the passed docker_reference. The pipes.run_command then executes the shell command without any prior sanitization, making the function vulnerable to command injections. A malicious user who is able to create or add inputs to a project can inject commands. Although the command injections are blind and the user will not receive direct feedback without logs, it is still possible to cause damage to the server/container. The vulnerability appears for example if a malicious user adds a semicolon after the input of docker://;, it would allow appending malicious commands.

Version 32.5.1 contains a patch for this issue. The docker_reference input should be sanitized to avoid command injections and, as a workaround, one may avoid creating commands with user controlled input directly.

References

Affected packages

Git / github.com/aboutcode-org/scancode.io

Affected ranges

Type
GIT
Repo
https://github.com/aboutcode-org/scancode.io
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/nexb/scancode.io
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.1.0

21.*

21.4.5

v21.*

v21.4.14
v21.4.28
v21.5.12
v21.6.10
v21.8.2
v21.9.6

v30.*

v30.0.0
v30.0.1
v30.1.0
v30.1.1
v30.2.0

v31.*

v31.0.0

v32.*

v32.0.0
v32.0.1
v32.1.0
v32.2.0
v32.3.0
v32.4.0
v32.5.0