Arbitrary Command Execution Affecting windows-cpu package, versions *
Snyk CVSS
Attack Complexity
High
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
EPSS
0.27% (68th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID npm:windows-cpu:20170417
- published 19 May 2017
- disclosed 19 May 2017
- credit Daniel Bond
Introduced: 19 May 2017
CVE-2017-1000219 Open this link in a new tabHow to fix?
There is no fix version for windows-cpu
.
Overview
windows-cpu
is a CPU monitoring utility for windows.
Affected versions of this package are vulnerable to Arbitrary Command Execution via the findLoad
method, which passes a user-inputed string to the shell without validation.
Proof of Concept: This code will open the built-in calculator program.
var win = require('windows-cpu');
wind.findLoad('foo & calc.exe');