Vulnerability Description
The unofficial SwiftLint extension before 1.4.5 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted swiftlint.path configuration value that triggers execution upon opening the workspace.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Swiftlint Project | Swiftlint | < 1.4.5 |
References
- https://github.com/vknabel/vscode-swiftlint/releases/tag/1.4.5Release NotesThird Party Advisory
- https://vuln.ryotak.me/advisories/12Third Party Advisory
- https://github.com/vknabel/vscode-swiftlint/releases/tag/1.4.5Release NotesThird Party Advisory
- https://vuln.ryotak.me/advisories/12Third Party Advisory
FAQ
What is CVE-2021-28790?
CVE-2021-28790 is a vulnerability with a CVSS score of 7.8 (HIGH). The unofficial SwiftLint extension before 1.4.5 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted swiftlint.path configurati...
How severe is CVE-2021-28790?
CVE-2021-28790 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-28790?
Check the references section above for vendor advisories and patch information. Affected products include: Swiftlint Project Swiftlint.