ghsa-28xh-wpgr-7fm8
Vulnerability from github
Published
2019-06-20 15:35
Modified
2020-08-31 18:31
VLAI Severity ?
Summary
Command Injection in open
Details
Versions of open before 6.0.0 are vulnerable to command injection when unsanitized user input is passed in.
The package does come with the following warning in the readme:
The same care should be taken when calling open as if you were calling child_process.exec directly. If it is an executable it will run in a new shell.
Recommendation
open is now the deprecated opn package. Upgrading to the latest version is likely have unwanted effects since it now has a very different API but will prevent this vulnerability.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "open"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.0.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-77"
],
"github_reviewed": true,
"github_reviewed_at": "2019-06-20T15:35:06Z",
"nvd_published_at": null,
"severity": "CRITICAL"
},
"details": "Versions of `open` before 6.0.0 are vulnerable to command injection when unsanitized user input is passed in.\n\nThe package does come with the following warning in the readme:\n\n```\nThe same care should be taken when calling open as if you were calling child_process.exec directly. If it is an executable it will run in a new shell.\n```\n\n\n## Recommendation\n\n`open` is now the deprecated `opn` package. Upgrading to the latest version is likely have unwanted effects since it now has a very different API but will prevent this vulnerability.",
"id": "GHSA-28xh-wpgr-7fm8",
"modified": "2020-08-31T18:31:51Z",
"published": "2019-06-20T15:35:49Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/pwnall/node-open/issues/68"
},
{
"type": "WEB",
"url": "https://github.com/pwnall/node-open/issues/69"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/319473"
},
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/663"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Command Injection in open"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…