First published: Thu Apr 29 2021(Updated: )
Prisma VS Code a VSCode extension for Prisma schema files. This is a Remote Code Execution Vulnerability that affects all versions of the Prisma VS Code extension older than 2.20.0. If a custom binary path for the Prisma format binary is set in VS Code Settings, for example by downloading a project that has a .vscode/settings.json file that sets a value for "prismaFmtBinPath". That custom binary is executed when auto-formatting is triggered by VS Code or when validation checks are triggered after each keypress on a *.prisma file. Fixed in versions 2.20.0 and 20.0.27. As a workaround users can either edit or delete the `.vscode/settings.json` file or check if the binary is malicious and delete it.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Prisma | <2.20.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21415 is classified as a Remote Code Execution vulnerability.
To fix CVE-2021-21415, upgrade the Prisma VS Code extension to version 2.20.0 or later.
CVE-2021-21415 affects all versions of the Prisma VS Code extension prior to 2.20.0.
CVE-2021-21415 affects the Prisma VS Code extension used for editing Prisma schema files.
CVE-2021-21415 can be exploited by an attacker when a custom binary path for the Prisma format binary is configured in VS Code settings.