-
Notifications
You must be signed in to change notification settings - Fork 585
Expand file tree
/
Copy pathGHSA-28xh-wpgr-7fm8.json
More file actions
58 lines (58 loc) · 1.68 KB
/
GHSA-28xh-wpgr-7fm8.json
File metadata and controls
58 lines (58 loc) · 1.68 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
{
"schema_version": "1.4.0",
"id": "GHSA-28xh-wpgr-7fm8",
"modified": "2023-01-09T05:01:44Z",
"published": "2019-06-20T15:35:49Z",
"aliases": [],
"summary": "Command Injection in open",
"details": "Versions of `open` before 6.0.0 are vulnerable to command injection when unsanitized user input is passed in.\n\nThe package does come with the following warning in the readme:\n\n```\nThe same care should be taken when calling open as if you were calling child_process.exec directly. If it is an executable it will run in a new shell.\n```\n\n\n## Recommendation\n\n`open` is now the deprecated `opn` package. Upgrading to the latest version is likely have unwanted effects since it now has a very different API but will prevent this vulnerability.",
"severity": [],
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "open"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0.0.2"
},
{
"fixed": "6.0.0"
}
]
}
]
}
],
"references": [
{
"type": "WEB",
"url": "https://github.com/pwnall/node-open/issues/68"
},
{
"type": "WEB",
"url": "https://github.com/pwnall/node-open/issues/69"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/319473"
},
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/663"
}
],
"database_specific": {
"cwe_ids": [
"CWE-77"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2019-06-20T15:35:06Z",
"nvd_published_at": null
}
}