Описание
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | Windows only |
esm-apps/bionic | not-affected | Windows only |
esm-apps/focal | not-affected | Windows only |
esm-apps/jammy | not-affected | Windows only |
esm-apps/xenial | not-affected | Windows only |
esm-infra-legacy/trusty | not-affected | Windows only |
focal | not-affected | Windows only |
jammy | not-affected | Windows only |
mantic | not-affected | Windows only |
trusty/esm | not-affected | Windows only |
Показывать по
8.1 High
CVSS3
Связанные уязвимости
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
Due to the improper handling of batch files in child_process.spawn / c ...
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
Уязвимость функций child_process.spawn() и child_process.spawnSync() программной платформы Node.js операционных систем Windows, позволяющая нарушителю обойти ограничения безопасности и выполнить произвольные команды
8.1 High
CVSS3