Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7010 | Azure CLI is the command-line interface for Microsoft Azure. In versions previous to 2.40.0, Azure CLI contains a vulnerability for potential code injection. Critical scenarios are where a hosting machine runs an Azure CLI command where parameter values have been provided by an external source. The vulnerability is only applicable when the Azure CLI command is run on a Windows machine and with any version of PowerShell and when the parameter value contains the `&` or `|` symbols. If any of these prerequisites are not met, this vulnerability is not applicable. Users should upgrade to version 2.40.0 or greater to receive a a mitigation for the vulnerability. |
Github GHSA |
GHSA-47xc-9rr2-q7p4 | Improper Control of Generation of Code ('Code Injection') in Azure CLI |
Tue, 22 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-22T17:17:26.636Z
Reserved: 2022-09-02T00:00:00.000Z
Link: CVE-2022-39327
Updated: 2024-08-03T12:00:44.150Z
Status : Modified
Published: 2022-10-25T17:15:56.150
Modified: 2024-11-21T07:18:02.780
Link: CVE-2022-39327
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA