Command Injection

Affecting ts-process-promises package, ALL versions

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

Affected versions of this package are vulnerable to Command Injection. The injection point is located in line 45 in main entry of package in lib/process-promises.js.

PoC

var a =require("ts-process-promises");
a.exec("touch JHU",{});

Remediation

There is no fixed version for ts-process-promises.

References

CVSS Score

8.6
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    Low
  • Availability
    Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:P/RL:O/RC:C
Credit
JHU System Security Lab
CVE
CVE-2020-7784
CWE
CWE-78
Snyk ID
SNYK-JS-TSPROCESSPROMISES-1048334
Disclosed
04 Dec, 2020
Published
08 Jan, 2021