Описание
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | Windows only |
| esm-apps/bionic | not-affected | Windows only |
| esm-apps/focal | not-affected | Windows only |
| esm-apps/jammy | not-affected | Windows only |
| esm-apps/xenial | not-affected | Windows only |
| esm-infra-legacy/trusty | not-affected | Windows only |
| focal | not-affected | Windows only |
| jammy | not-affected | Windows only |
| mantic | not-affected | Windows only |
| trusty/esm | not-affected | Windows only |
Показывать по
EPSS
8.1 High
CVSS3
Связанные уязвимости
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
Due to the improper handling of batch files in child_process.spawn / c ...
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
Уязвимость функций child_process.spawn() и child_process.spawnSync() программной платформы Node.js операционных систем Windows, позволяющая нарушителю обойти ограничения безопасности и выполнить произвольные команды
EPSS
8.1 High
CVSS3