Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-24033

Опубликовано: 09 мар. 2021
Источник: nvd
CVSS3: 5.6
CVSS2: 6.8
EPSS Низкий

Описание

react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:facebook:react-dev-utils:*:*:*:*:*:*:*:*
Версия до 11.0.4 (исключая)

EPSS

Процентиль: 80%
0.01439
Низкий

5.6 Medium

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-78
CWE-78

Связанные уязвимости

CVSS3: 5.6
redhat
почти 5 лет назад

react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

CVSS3: 5.6
github
почти 5 лет назад

react-dev-utils OS Command Injection in function `getProcessForPort`

EPSS

Процентиль: 80%
0.01439
Низкий

5.6 Medium

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-78
CWE-78