Skip to content

Malicious web page can control the Lens terminal feature

High
stevejr published GHSA-x8mv-qr7w-4fm9 Nov 17, 2021

Package

Lens-IDE (Lens)

Affected versions

< 5.2.7 Linux. Other platforms unaffected

Patched versions

>= 5.2.7

Description

Impact

Linux users running Lens could be compromised by visiting a malicious website. The malicious website could make websocket connections from the victim's browser to Lens and so operate the local terminal feature. This would allow the attacker to execute arbitrary commands as the Lens user.

To exploit

  1. Lens needs to be running on Linux
  2. The attacker needs to know the cluster ID of at least one of the victim's clusters
  3. The victim needs to visit a malicious site

Patches

Fixed in #4285. Users should upgrade to 5.2.7 or later.

Workarounds

None.

References

None.

For more information

If you have any questions or comments about this advisory:

Severity

High

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

CVE ID

CVE-2021-44458

Weaknesses

Credits