Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-24033

Опубликовано: 09 мар. 2021
Источник: redhat
CVSS3: 5.6

Описание

react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 1servicemesh-grafanaNot affected
OpenShift Service Mesh 1servicemesh-prometheusNot affected
OpenShift Service Mesh 2.0servicemesh-grafanaNot affected
OpenShift Service Mesh 2.0servicemesh-prometheusNot affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/console-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/search-ui-rhel8Not affected
Red Hat Decision Manager 7react-dev-utilsOut of support scope
Red Hat OpenShift Container Platform 4openshift4/ose-grafanaNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-prometheusNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-thanos-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=1936805nodejs-react-dev-utils: function getProcessForPort concatenates input argument into a command string

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
nvd
почти 5 лет назад

react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

CVSS3: 5.6
github
почти 5 лет назад

react-dev-utils OS Command Injection in function `getProcessForPort`

5.6 Medium

CVSS3