Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-27980

Опубликовано: 09 янв. 2025
Источник: ubuntu
Приоритет: medium
CVSS3: 8.1

Описание

Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.

РелизСтатусПримечание
devel

not-affected

Windows only
esm-apps/bionic

not-affected

Windows only
esm-apps/focal

not-affected

Windows only
esm-apps/jammy

not-affected

Windows only
esm-apps/xenial

not-affected

Windows only
esm-infra-legacy/trusty

not-affected

Windows only
focal

not-affected

Windows only
jammy

not-affected

Windows only
mantic

not-affected

Windows only
trusty/esm

not-affected

Windows only

Показывать по

8.1 High

CVSS3

Связанные уязвимости

redhat
больше 1 года назад

Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.

CVSS3: 8.1
nvd
7 месяцев назад

Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.

CVSS3: 8.1
debian
7 месяцев назад

Due to the improper handling of batch files in child_process.spawn / c ...

CVSS3: 8.1
github
7 месяцев назад

Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость функций child_process.spawn() и child_process.spawnSync() программной платформы Node.js операционных систем Windows, позволяющая нарушителю обойти ограничения безопасности и выполнить произвольные команды

8.1 High

CVSS3