Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Command Injection in react-dev-utils #1962

Merged
merged 2 commits into from
Mar 3, 2021
Merged

Conversation

zpbrent
Copy link
Contributor

@zpbrent zpbrent commented Mar 3, 2021

✍️ Description

react-dev-utils includes some utilities used by Create React App.

The function getProcessForPort in react-dev-utils is vulnerable to command injection.

🕵️‍♂️ Proof of Concept

Create a .js file with the content below and run it, then the file pzhou@shu can be illegally created.

// poc.js
var getProcessForPort = require('react-dev-utils/getProcessForPort');

getProcessForPort('11;$(touch pzhou@shu)');

💥 Impact

Arbitrary code execution.

☎️ Contact

Not currently.

✅ Checklist

In my pull request, I have:

  • Created and populated the README.md and vulnerability.json files
  • Provided the repository URL and any applicable permalinks
  • Defined all the applicable weaknesses (CWEs)
  • Proposed the CVSS vector items i.e. User Interaction, Attack Complexity
  • Checked that the vulnerability affects the latest version of the package released
  • Checked that a fix does not currently exist that remediates this vulnerability
  • Complied with all applicable laws

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
automerge disclosure Vulnerability disclosure
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants