2.1 LOW
- CVSS version (CVSS): 4.0
- Attack Vector (AV): Network (N)
- Attack Complexity (AC): Low (L)
- Attack Requirement (AT): None (N)
- Privileges Required (PR): Low (L)
- User Interaction (UI): None (N)
- Vulnerable System Impact Confidentiality (VC): Low (L)
- Vulnerable System Impact Integrity (VI): None (N)
- Vulnerable System Impact Availability (VA): None (N)
- Subsequent System Impact Confidentiality (SC): None (N)
- Subsequent System Impact Integrity (SI): None (N)
- Subsequent System Impact Availability (SA): None (N)
- Exploit Maturity (E): POC (P)
- Modified Attack Vector (MAV): Network (N)
- Modified Attack Complexity (MAC): Low (L)
- Modified Attack Requirement (MAT): None (N)
- Modified Privileges Required (MPR): Low (L)
- Modified User Interaction (MUI): None (N)
- Modified Vulnerable System Impact Confidentiality (MVC): Low (L)
- Modified Vulnerable System Impact Integrity (MVI): None (N)
- Modified Vulnerable System Impact Availability (MVA): None (N)
- Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
- Modified Subsequent System Impact Integrity (MSI): Negligible (N)
- Modified Subsequent System Impact Availability (MSA): Negligible (N)
- Safety (S): Not Defined (X)
- Automatable (AU): Not Defined (X)
- Recovery (R): Not Defined (X)
- Value Density (V): Not Defined (X)
- Vulnerability Response Effort (RE): Not Defined (X)
- Provider Urgency (U): Not Defined (X)
- Confidentiality Req. (CR): Not Defined (X)
- Integrity Req. (IR): Not Defined (X)
- Availability Req. (AR): Not Defined (X)
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse ignored package vscode-extensions.kilocode.kilo-code
- @LeSuisse ignored reference VDB-36439…
- @LeSuisse accepted
- @LeSuisse published on GitHub
Kilo-Org kilocode Environment Variable config.ts load information disclosure
A flaw has been found in Kilo-Org kilocode up to 7.0.47. This issue affects the function Load of the file packages/opencode/src/config/config.ts of the component Environment Variable Handler. Executing a manipulation of the argument KILO_CONFIG_CONTENT can lead to information disclosure. It is possible to launch the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
-
VDB-364391 | Kilo-Org kilocode Environment Variable config.ts load information disclosure vdb-entrytechnical-description
-
Submit #811400 | Kilo-Org kilocode 7.0.47 Arbitrary File Read (CWE-200) third-party-advisory
Ignored references (1)
Affected products
- ==7.0.26
- ==7.0.6
- ==7.0.1
- ==7.0.5
- ==7.0.11
- ==7.0.32
- ==7.0.39
- ==7.0.47
- ==7.0.27
- ==7.0.4
- ==7.0.34
- ==7.0.12
- ==7.0.0
- ==7.0.37
- ==7.0.17
- ==7.0.7
- ==7.0.13
- ==7.0.2
- ==7.0.18
- ==7.0.24
- ==7.0.29
- ==7.0.8
- ==7.0.9
- ==7.0.35
- ==7.0.43
- ==7.0.40
- ==7.0.3
- ==7.0.36
- ==7.0.44
- ==7.0.38
- ==7.0.28
- ==7.0.42
- ==7.0.16
- ==7.0.14
- ==7.0.15
- ==7.0.23
- ==7.0.46
- ==7.0.31
- ==7.0.33
- ==7.0.19
- ==7.0.30
- ==7.0.20
- ==7.0.10
- ==7.0.25
- ==7.0.21
- ==7.0.22
- ==7.0.41
- ==7.0.45
Matching in nixpkgs
pkgs.kilocode-cli
Terminal User Interface for Kilo Code
Ignored packages (1)
pkgs.vscode-extensions.kilocode.kilo-code
Open Source AI coding assistant for planning, building, and fixing code
Package maintainers
-
@xiaoxiangmoe ZHAO JinXiang <xiaoxiangmoe@gmail.com>