Aug. 7, 2023, 9:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

ScanCode.io is a server to script and automate software composition analysis with ScanPipe pipelines. Prior to version 32.5.1, the software has a possible command injection vulnerability in the docker fetch process as it allows to append malicious commands in the `docker_reference` parameter.

In the function `scanpipe/pipes/fetch.py:fetch_docker_image` the parameter `docker_reference` is user controllable. The `docker_reference` variable is then passed to the vulnerable function `get_docker_image_platform`. However, the `get_docker_image_plaform` function constructs a shell command with the passed `docker_reference`. The `pipes.run_command` then executes the …

analysis command command injection cve docker fetch function injection malicious parameter pipelines process script server software software composition analysis variable version vulnerability

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

IT Consultant

@ Whitecollars | Erbil, Iraq

Sr. IAM Engineer - Okta (REMOTE)

@ GuidePoint Security LLC | Remote

DevSecOps Engineer

@ Raft | Remote, US