Описание
Shescape on Windows escaping may be bypassed in threaded context
Impact
This may impact users that use Shescape on Windows in a threaded context (e.g. using Worker threads). The vulnerability can result in Shescape escaping (or quoting) for the wrong shell, thus allowing attackers to bypass protections depending on the combination of expected and used shell.
This snippet demonstrates a vulnerable use of Shescape:
Patches
This bug has been patched in v1.7.4 which you can upgrade to now. No further changes are required.
Workarounds
If you are impacted there is no workaround possible.
References
For more information
- Comment on Pull Request #1142
- Comment on commit
0b976da - Open an issue at https://github.com/ericcornelissen/shescape/issues (New issue > Question > Get started)
Ссылки
- https://github.com/ericcornelissen/shescape/security/advisories/GHSA-j55r-787p-m549
- https://nvd.nist.gov/vuln/detail/CVE-2023-40185
- https://github.com/ericcornelissen/shescape/pull/1142
- https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63
- https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4
Пакеты
shescape
< 1.7.4
1.7.4
Связанные уязвимости
shescape is simple shell escape library for JavaScript. This may impact users that use Shescape on Windows in a threaded context. The vulnerability can result in Shescape escaping (or quoting) for the wrong shell, thus allowing attackers to bypass protections depending on the combination of expected and used shell. This bug has been patched in version 1.7.4.