Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5q6m-3h65-w53x

Опубликовано: 11 мар. 2021
Источник: github
Github: Прошло ревью
CVSS3: 5.6

Описание

react-dev-utils OS Command Injection in function getProcessForPort

react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

Пакеты

Наименование

react-dev-utils

npm
Затронутые версииВерсия исправления

>= 0.4.0, < 11.0.4

11.0.4

EPSS

Процентиль: 80%
0.01439
Низкий

5.6 Medium

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 5.6
redhat
почти 5 лет назад

react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

CVSS3: 5.6
nvd
почти 5 лет назад

react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

EPSS

Процентиль: 80%
0.01439
Низкий

5.6 Medium

CVSS3

Дефекты

CWE-78