
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-25171 affects the p4 package versions before 0.0.7. The vulnerability was discovered and disclosed on December 12, 2022, and published on December 19, 2022. This security issue involves a Command Injection vulnerability in the run() function of the package due to improper input sanitization (Snyk).
The vulnerability is classified with a CVSS v3.1 base score of 7.4 (High) by Snyk. The attack vector is Local, with High attack complexity, requiring no privileges or user interaction. The scope is unchanged, but the potential impact is rated High for confidentiality, integrity, and availability. The vulnerability exists in the run() function where improper input sanitization could allow command injection attacks (Snyk).
If exploited, this vulnerability could result in a total loss of confidentiality, leading to disclosure of all resources within the impacted component to the attacker. Additionally, there could be a complete loss of integrity, allowing the attacker to modify protected files, and a total loss of availability, enabling the attacker to fully deny access to resources in the impacted component (Snyk).
The recommended mitigation is to upgrade the p4 package to version 0.0.7 or higher. The fix was implemented by changing the command execution method from childprocess.exec to childprocess.spawn, which provides better security against command injection attacks (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."