jest-puppeteer-docker@1.2.0

Vulnerabilities

1 via 1 paths

Dependencies

142

Source

npm

Find, fix and prevent vulnerabilities in your code.

Severity
  • 1
Status
  • 1
  • 0
  • 0

high severity

Command Injection

  • Vulnerable module: find-process
  • Introduced through: jest-puppeteer@4.4.0

Detailed paths

  • Introduced through: jest-puppeteer-docker@1.2.0 jest-puppeteer@4.4.0 jest-environment-puppeteer@4.4.0 jest-dev-server@4.4.0 find-process@1.4.5

Overview

find-process is a find process info by port/pid/name etc.

Affected versions of this package are vulnerable to Command Injection. When getting the information by PID and port number, the user needs to inform a value, which is used in a concatenation of an OS command. There is no user input check to know if the PID or the port is a number, as such, an attacker may send a malicious string that will be interpreted as an OS command.

Remediation

A fix was pushed into the master branch but not yet published.

References