Vulnerabilities

1 via 1 paths

Dependencies

49

Source

GitHub

Commit

dc50505e

Find, fix and prevent vulnerabilities in your code.

Severity
  • 1
Status
  • 1
  • 0
  • 0

high severity

Command Injection

  • Vulnerable module: glob
  • Introduced through: glob@10.3.12

Detailed paths

  • Introduced through: gulp-mvb@dennisreimann/gulp-mvb#dc50505e1b90772d7f90b94fb4630e75f6e1dacb glob@10.3.12
    Remediation: Upgrade to glob@10.5.0.

Overview

Affected versions of this package are vulnerable to Command Injection in the CLI, via the -c/--cmd option. The processing of commandline options in src/bin.mts calls the foregroundChild() on them, which defaults to setting shell: true. An attacker who can control the filenames being matched can execute arbitrary commands with the privileges of the user running the process by writing files with malicious names containing shell metacharacters - e.g. $(touch injected_poc).

The malicious filename must be the target of a match by the glob -c command. Such filenames would not trigger this exploit when invoking glob() or related functions via the library API.

Remediation

Upgrade glob to version 10.5.0, 11.1.0 or higher.

References