Skip to content

code-server 3.9.3 vulnerabilities  #3185

Closed
@Jose-Matsuda

Description

@Jose-Matsuda

Hi there,

I think this is #2860 but for a different package.
My team uses code-server in docker images and before pushing it to our repo we run a trivy scan and get the hit (below)

Written by John Gilmore and Jay Fenlason.
trivy
Scanning for vulnerabilties...
╔══════════════════════╤═════════════════╤═════════════════╤════════════════════════════════════════════════════╤══════════════════════╗
║ VULNERABILITY ID     │ PACKAGE NAME    │ SEVERITY        │ DESCRIPTION                                        │ TARGET               ║
╟──────────────────────┼─────────────────┼─────────────────┼────────────────────────────────────────────────────┼──────────────────────╢
║ CVE-2021-28918       │ netmask         │ CRITICAL        │ Improper input validation of octal strings in      │ usr/lib/code-server/ ║
║                      │                 │                 │ netmask npm package v1.0.6 and below allows        │ lib/vscode/yarn.lock ║
║                      │                 │                 │ unauthenticated remote attackers to perform        │                      ║
║                      │                 │                 │ indeterminate SSRF, RFI, and LFI attacks on many   │                      ║
║                      │                 │                 │ of the dependent packages. A remote                │                      ║
║                      │                 │                 │ unauthenticated attacker can bypass packages       │                      ║
║                      │                 │                 │ relying on netmask to filter IPs and reach         │                      ║
║                      │                 │                 │ critical VPN or LAN hosts.                         │                      ║
╟──────────────────────┼─────────────────┼─────────────────┼────────────────────────────────────────────────────┼──────────────────────╢
║ CVE-2021-28918       │ netmask         │ CRITICAL        │ Improper input validation of octal strings in      │ usr/lib/code-server/ ║
║                      │                 │                 │ netmask npm package v1.0.6 and below allows        │ yarn.lock            ║
║                      │                 │                 │ unauthenticated remote attackers to perform        │                      ║
║                      │                 │                 │ indeterminate SSRF, RFI, and LFI attacks on many   │                      ║
║                      │                 │                 │ of the dependent packages. A remote                │                      ║
║                      │                 │                 │ unauthenticated attacker can bypass packages       │                      ║
║                      │                 │                 │ relying on netmask to filter IPs and reach         │                      ║
║                      │                 │                 │ critical VPN or LAN hosts.                         │                      ║
╚══════════════════════╧═════════════════╧═════════════════╧════════════════════════════════════════════════════╧══════════════════════╝

GHSA-4c7m-wxvm-r7gc

OS/Web Information

  • Web Browser: Chrome
  • Local OS: Ubuntu
  • Remote OS: Ubuntu
  • Remote Architecture: Docker image
  • code-server --version: 3.9.3

This issue can be reproduced in VS Code: No

Thanks

Metadata

Metadata

Assignees

No one assigned

    Labels

    dependenciesPull requests that update a dependency filesecuritySecurity related

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions