Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vm67-7vmg-66vm

Опубликовано: 06 апр. 2021
Источник: github
Github: Прошло ревью
CVSS3: 6.4

Описание

Arbitrary Command Injection in portprocesses

Impact

An Arbitrary Command Injection vulnerability was reported in portprocesses impacting versions <= 1.0.4.

Example (Proof of Concept)

The following example demonstrates the vulnerability and will run touch success therefore creating a file named success.

const portprocesses = require("portprocesses"); portprocesses.killProcess("$(touch success)");

Пакеты

Наименование

portprocesses

npm
Затронутые версииВерсия исправления

< 1.0.5

1.0.5

EPSS

Процентиль: 77%
0.01082
Низкий

6.4 Medium

CVSS3

Дефекты

CWE-77
CWE-78

Связанные уязвимости

CVSS3: 6.3
nvd
почти 5 лет назад

This affects the package portprocesses before 1.0.5. If (attacker-controlled) user input is given to the killProcess function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.

EPSS

Процентиль: 77%
0.01082
Низкий

6.4 Medium

CVSS3

Дефекты

CWE-77
CWE-78