kill-by-port is a kills process by port
Affected versions of this package are vulnerable to Arbitrary Command Injection. If (attacker-controlled) user input is given to the
killByPort function, it is possible for an attacker to execute arbitrary commands.
This is due to use of the
exec function without input sanitization.
PoC (provided by reporter):
var kill_by_port = require('kill-by-port'); kill_by_port.killByPort('$(touch success)');
A file called
success will be created as a result of the execution of
kill-by-port to version 0.0.2 or higher.