
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2022-25914 affects the package com.google.cloud.tools:jib-core versions before 0.22.0. This critical security flaw was discovered in February 2022 and involves a Remote Code Execution (RCE) vulnerability via the isDockerInstalled function. The vulnerability stems from the package attempting to execute input without proper validation (Snyk, MITRE).
The vulnerability exists in the isDockerInstalled function of the jib-core package, which previously attempted to execute any provided executable path without proper validation. The issue has a CVSS v3.1 base score of 9.8 (Critical) according to Red Hat's assessment, though Snyk rates it with a score of 5.6 (Medium). The vulnerability allows potential remote code execution through the improper handling of executable paths (Red Hat, Snyk).
If exploited, this vulnerability could allow attackers to execute arbitrary code through the isDockerInstalled function. The impact includes potential unauthorized code execution with the permissions of the running application, which could lead to system compromise (Snyk).
The recommended mitigation is to upgrade com.google.cloud.tools:jib-core to version 0.22.0 or higher. The fix involves changing the implementation to verify file existence and permissions instead of executing the file to check if Docker is installed (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."