You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Shelljs 0.8.3 and before are vulnerable to Command Injection. Commands can be invoked from shell.exec(), those commands will include input from external sources, to be passed as arguments to system executables and allowing an attacker to inject arbitrary commands.
WS-2017-3737 - Medium Severity Vulnerability
Vulnerable Library - shelljs-0.3.0.tgz
Portable Unix shell commands for Node.js
Library home page: https://registry.npmjs.org/shelljs/-/shelljs-0.3.0.tgz
Path to dependency file: /OSWaldito/package.json
Path to vulnerable library: /tmp/git/OSWaldito/node_modules/shelljs/package.json
Dependency Hierarchy:
Found in HEAD commit: e129d0dd7d948d294251d6b67a234bcdb31e255b
Vulnerability Details
Shelljs 0.8.3 and before are vulnerable to Command Injection. Commands can be invoked from shell.exec(), those commands will include input from external sources, to be passed as arguments to system executables and allowing an attacker to inject arbitrary commands.
Publish Date: 2019-06-16
URL: WS-2017-3737
CVSS 2 Score Details (5.5)
Base Score Metrics not available
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: