Bug 1204747 - (CVE-2022-39327) VUL-0: CVE-2022-39327: azure-cli: code injection via command line argument
(CVE-2022-39327)
VUL-0: CVE-2022-39327: azure-cli: code injection via command line argument
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Major
: ---
Assigned To: Robert Schweikert
Security Team bot
https://smash.suse.de/issue/346210/
CVSSv3.1:SUSE:CVE-2022-39327:8.2:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-10-26 12:49 UTC by Carlos López
Modified: 2022-10-26 12:51 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2022-10-26 12:49:52 UTC
CVE-2022-39327

Azure CLI is the command-line interface for Microsoft Azure. In versions
previous to 2.40.0, Azure CLI contains a vulnerability for potential code
injection. Critical scenarios are where a hosting machine runs an Azure CLI
command where parameter values have been provided by an external source. The
vulnerability is only applicable when the Azure CLI command is run on a Windows
machine and with any version of PowerShell and when the parameter value contains
the `&` or `|` symbols. If any of these prerequisites are not met, this
vulnerability is not applicable. Users should upgrade to version 2.40.0 or
greater to receive a a mitigation for the vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39327
https://www.cve.org/CVERecord?id=CVE-2022-39327
https://github.com/Azure/azure-cli/security/advisories/GHSA-47xc-9rr2-q7p4
https://github.com/Azure/azure-cli/pull/23514
https://github.com/Azure/azure-cli/pull/24015
Comment 1 Carlos López 2022-10-26 12:51:05 UTC
Only relevant when running on Windows, closing.