The traceroute (aka node-traceroute) package through 1.0.0 for Node.js allows remote command injection via the host parameter. This occurs because the Child.exec() method, which is considered to be not entirely safe, is used. In particular, an OS command can be placed after a newline character.
References
Link | Resource |
---|---|
https://github.com/jaw187/node-traceroute/tags | Third Party Advisory |
https://medium.com/@shay_62828/shell-command-injection-through-traceroute-npm-package-a4cf7b6553e3 | Exploit Third Party Advisory |
https://snyk.io/vuln/npm:traceroute:20160311 | Exploit Third Party Advisory |
https://www.npmjs.com/package/traceroute | Product Third Party Advisory |
https://www.linkedin.com/posts/op-innovate_shell-command-injection-through-traceroute-activity-6678956453086191616-Rcpy | Third Party Advisory |
https://www.op-c.net/2020/06/17/shell-command-injection-through-traceroute-npm-package/ | Exploit Third Party Advisory |
https://www.npmjs.com/advisories/1465 | Third Party Advisory |
https://github.com/jaw187/node-traceroute/commit/b99ee024a01a40d3d20a92ad3769cc78a3f6386f | Patch Third Party Advisory |
Configurations
Information
Published : 2020-06-25 10:15
Updated : 2020-07-06 10:29
NVD link : CVE-2018-21268
Mitre link : CVE-2018-21268
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
traceroute_project
- traceroute