fsa through 0.5.1 is vulnerable to Command Injection. The first argument of 'execGitCommand()', located within 'lib/rep.js#63' can be controlled by users without any sanitization to inject arbitrary commands.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JS-FSA-564118 | Exploit Third Party Advisory |
https://github.com/gregof/fsa/blob/master/lib/rep.js#L12 | Patch Third Party Advisory |
Configurations
Information
Published : 2020-04-07 07:15
Updated : 2020-04-07 12:39
NVD link : CVE-2020-7615
Mitre link : CVE-2020-7615
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
fsa_project
- fsa