Skip to content

Malicious web page can control the Lens terminal feature

High
stevejr published GHSA-x8mv-qr7w-4fm9 Nov 17, 2021

Package

Lens-IDE (Lens)

Affected versions

< 5.2.7 Linux. Other platforms unaffected

Patched versions

>= 5.2.7

Description

Impact

Linux users running Lens could be compromised by visiting a malicious website. The malicious website could make websocket connections from the victim's browser to Lens and so operate the local terminal feature. This would allow the attacker to execute arbitrary commands as the Lens user.

To exploit

  1. Lens needs to be running on Linux
  2. The attacker needs to know the cluster ID of at least one of the victim's clusters
  3. The victim needs to visit a malicious site

Patches

Fixed in #4285. Users should upgrade to 5.2.7 or later.

Workarounds

None.

References

None.

For more information

If you have any questions or comments about this advisory:

Severity

High
8.4
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

CVE ID

CVE-2021-44458

Weaknesses

Credits