
Cloud Vulnerability DB
A community-led vulnerabilities database
In JetBrains Rider before version 2022.2, a security vulnerability was identified where the Trust and Open Project dialog could be bypassed, potentially leading to local code execution (NVD, CVE).
The vulnerability has been assigned CVE-2022-37396 with a CVSS v3.1 Base Score of 7.8 (HIGH) according to NVD's assessment. The vector string is CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access, low attack complexity, low privileges required, no user interaction needed, and high impact on confidentiality, integrity, and availability. JetBrains' own assessment differs with a CVSS score of 4.1 (MEDIUM) (NVD).
The vulnerability could allow an attacker to execute code locally by bypassing the Trust and Open Project dialog security mechanism. This affects the confidentiality, integrity, and availability of the system with high severity (NVD).
The vulnerability has been fixed in JetBrains Rider version 2022.2. Users are advised to upgrade to this version or later to mitigate the security risk (JetBrains Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."