Arbitrary Command Execution

Affecting windows-cpu package, ALL versions

Do your applications use this vulnerable package? Test your applications

Overview

windows-cpu is a CPU monitoring utility for windows.

Affected versions of this package are vulnerable to Arbitrary Command Execution via the findLoad method, which passes a user-inputed string to the shell without validation.

Proof of Concept: This code will open the built-in calculator program.

var win = require('windows-cpu');
wind.findLoad('foo & calc.exe');

Remediation

There is no fix version for windows-cpu.

References

CVSS Score

8.1
high severity
  • Attack Vector
    Network
  • Attack Complexity
    High
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Credit
Daniel Bond
CVE
CVE-2017-1000219
CWE
CWE-77
Snyk ID
npm:windows-cpu:20170417
Disclosed
19 May, 2017
Published
19 May, 2017