-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
package is signed as high severity vulnerability from npm #2
Comments
fix done! https://www.npmjs.com/package/node-os-utils npm install node-os-utils@1.1.0 |
Seems like this hasn't been fixed yet |
@rdimascio because call system commands? |
Could it work to contact the individual who reported the incident? He may have specifics that you can react to. The advisory site https://www.npmjs.com/advisories/784 links his homepage, where there is email for him to be contacted. Because node-os-utils fails npm audit, and passing npm audit is part of our build pipeline, we can't use it any longer. |
@peterkingsbury |
@peterkingsbury @rdimascio @Zorono @gchiocchio https://www.npmjs.com/advisories/784 Overview Remediation Thank you all, |
Hello, sorry for the delayed response. The following code snippet demonstrates the vulnerability in the version that I originally examined:done = function done(){ var DUMMY_FILE = './xyzzy'; var command = "$(touch " + DUMMY_FILE + ")"; function dummySource(val){ dummySource(' '); var nodeosutils = require('node-os-utils') done();executing this code resulted in the creation of a file "xyzzy" due to the execution of an injected command. |
I just tried running this code with the current version of node-os-utils, and the vulnerability appears to have been eliminated. |
package is signed as high severity vulnerability from npm
https://nodesecurity.io/advisories/784
The text was updated successfully, but these errors were encountered: