Vulnerabilities

1 via 1 paths

Dependencies

16

Source

GitHub

Commit

2ee996d8

Find, fix and prevent vulnerabilities in your code.

Severity
  • 1
Status
  • 1
  • 0
  • 0

high severity

Remote Code Execution (RCE)

  • Vulnerable module: shell-quote
  • Introduced through: @generalov/open-in-editor@2.3.0

Detailed paths

  • Introduced through: open-in-editor-connect@generalov/open-in-editor-connect#2ee996d8fc295f5eaf892ce60cd3af9c33ea67a3 @generalov/open-in-editor@2.3.0 shell-quote@1.6.1

Overview

shell-quote is a package used to quote and parse shell commands.

Affected versions of this package are vulnerable to Remote Code Execution (RCE). An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character.

Remediation

Upgrade shell-quote to version 1.7.3 or higher.

References