curling@0.2.0 vulnerabilities

A simple wrapper around curl with a easy to use interface.

Direct Vulnerabilities

Known vulnerabilities in the curling package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Remote Code Execution

curling is a node wrapper for curl with a very simple api.

Affected versions of this package are vulnerable to Remote Code Execution. The regular expression in run() in lib/curl-transport.js does not perform proper validation. Combined with curl, this can lead to the injection of arbitrary commands.

PoC

const curling = require('curling');

curling.run('file:///etc/passwd -o ./index.js', function(d, payload){console.log(payload)});

How to fix Remote Code Execution?

There is no fixed version for curling.

*
  • H
Command Injection

curling is a node wrapper for curl with a very simple api.

Affected versions of this package are vulnerable to Command Injection via the run(command,cb) function. The command argument can be controlled by users without any sanitization.

PoC by JHU System Security Lab

var root = require("curling");
root.run("& touch JHU",function(){});

How to fix Command Injection?

Upgrade curling to version 1.1.0 or higher.

<1.1.0