Vulnerability Description
The unofficial Swift Development Environment extension before 2.12.1 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted sourcekit-lsp.serverPath, swift.languageServerPath, swift.path.sourcekite, swift.path.sourcekiteDockerMode, swift.path.swift_driver_bin, or swift.path.shell configuration value that triggers execution upon opening the workspace.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Swift Development Environment Project | Swift Development Environment | < 2.12.1 |
References
- https://github.com/vknabel/vscode-swift-development-environment/releases/tag/2.1Release NotesThird Party Advisory
- https://vuln.ryotak.me/advisories/14Third Party Advisory
- https://github.com/vknabel/vscode-swift-development-environment/releases/tag/2.1Release NotesThird Party Advisory
- https://vuln.ryotak.me/advisories/14Third Party Advisory
FAQ
What is CVE-2021-28792?
CVE-2021-28792 is a vulnerability with a CVSS score of 7.8 (HIGH). The unofficial Swift Development Environment extension before 2.12.1 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted sourc...
How severe is CVE-2021-28792?
CVE-2021-28792 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-28792?
Check the references section above for vendor advisories and patch information. Affected products include: Swift Development Environment Project Swift Development Environment.