Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fmf5-j5j9-99pp

Опубликовано: 07 мая 2021
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

OS Command Injection in pulverizr

pulverizr through 0.7.0 allows execution of arbitrary commands. Within lib/job.js, the variable filename can be controlled by the attacker. This function uses the variable "filename" to construct the argument of the exec call without any sanitization. In order to successfully exploit this vulnerability, an attacker will need to create a new file with the same name as the attack command.

Пакеты

Наименование

pulverizr

npm
Затронутые версииВерсия исправления

<= 0.7.0

Отсутствует

EPSS

Процентиль: 62%
0.00426
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 9.8
nvd
почти 6 лет назад

pulverizr through 0.7.0 allows execution of arbitrary commands. Within "lib/job.js", the variable "filename" can be controlled by the attacker. This function uses the variable "filename" to construct the argument of the exec call without any sanitization. In order to successfully exploit this vulnerability, an attacker will need to create a new file with the same name as the attack command.

CVSS3: 9.8
fstec
почти 6 лет назад

Уязвимость пакета Pulverizr пакетного менеджера NPM, позволяющая нарушителю выполнять произвольные команды

EPSS

Процентиль: 62%
0.00426
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-78